General

  • Target

    b6f294a7db1d905b2119ddea993a3aac3f5603253d07c281cbad98a6463ee51e

  • Size

    568KB

  • Sample

    250119-pqw7baxmcx

  • MD5

    e8a8102c2e95fb8112397e77869dd7d0

  • SHA1

    b9b563cc226445f93f1bad56242d8c7d33d1922e

  • SHA256

    b6f294a7db1d905b2119ddea993a3aac3f5603253d07c281cbad98a6463ee51e

  • SHA512

    884eb55abee568db6d3bcb2ef473ff941f3a8db18c76c6163cd9fd710a777290724a2072b62bdacc5b3a59ad8db74a6a95980e35ebf1c581e824f14517d5154d

  • SSDEEP

    12288:vi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8ywEP1J:vi2Tro2H2HESq2eWJ6MQjySjy3J

Malware Config

Targets

    • Target

      b6f294a7db1d905b2119ddea993a3aac3f5603253d07c281cbad98a6463ee51e

    • Size

      568KB

    • MD5

      e8a8102c2e95fb8112397e77869dd7d0

    • SHA1

      b9b563cc226445f93f1bad56242d8c7d33d1922e

    • SHA256

      b6f294a7db1d905b2119ddea993a3aac3f5603253d07c281cbad98a6463ee51e

    • SHA512

      884eb55abee568db6d3bcb2ef473ff941f3a8db18c76c6163cd9fd710a777290724a2072b62bdacc5b3a59ad8db74a6a95980e35ebf1c581e824f14517d5154d

    • SSDEEP

      12288:vi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8ywEP1J:vi2Tro2H2HESq2eWJ6MQjySjy3J

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks