General

  • Target

    0aa121ad4ba8c2e95673d60696496b0e46d1532fd0b2712f0ad0d08806b0a876

  • Size

    5.6MB

  • Sample

    250119-psrdvaxnay

  • MD5

    252a3f1c6a0f477927d230b9f1fec17b

  • SHA1

    31e12ef81b3bc0234d97c4339b53a93185e29a03

  • SHA256

    0aa121ad4ba8c2e95673d60696496b0e46d1532fd0b2712f0ad0d08806b0a876

  • SHA512

    e0c749fa097d9478f5b09c5c9eca57dbb509182cea89bcc1695e35c5b413b34e996ae25b5f8bb63ccab120a76fac52556923877bf62f39aec69b4377a9fdadcb

  • SSDEEP

    98304:icy2LkvNiTy7+dJa9HUzIlLBjgBpDR8l4CsMpCvpmO/D0RLpX9q7xiTVf:ny2LkvNBNH9BgUfCvxD0RSli5f

Malware Config

Targets

    • Target

      0aa121ad4ba8c2e95673d60696496b0e46d1532fd0b2712f0ad0d08806b0a876

    • Size

      5.6MB

    • MD5

      252a3f1c6a0f477927d230b9f1fec17b

    • SHA1

      31e12ef81b3bc0234d97c4339b53a93185e29a03

    • SHA256

      0aa121ad4ba8c2e95673d60696496b0e46d1532fd0b2712f0ad0d08806b0a876

    • SHA512

      e0c749fa097d9478f5b09c5c9eca57dbb509182cea89bcc1695e35c5b413b34e996ae25b5f8bb63ccab120a76fac52556923877bf62f39aec69b4377a9fdadcb

    • SSDEEP

      98304:icy2LkvNiTy7+dJa9HUzIlLBjgBpDR8l4CsMpCvpmO/D0RLpX9q7xiTVf:ny2LkvNBNH9BgUfCvxD0RSli5f

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks