General

  • Target

    25eb07ad9b26e94e1125ba19b2187009e975a94b3bbc166fb98e55da2a64d4cd

  • Size

    8.2MB

  • Sample

    250119-psrplsxnbs

  • MD5

    e06e82769714f1de59d2473879d401ca

  • SHA1

    5a6f7d55e2e6b5197c5ab2f7c68beb662a8477a1

  • SHA256

    25eb07ad9b26e94e1125ba19b2187009e975a94b3bbc166fb98e55da2a64d4cd

  • SHA512

    94b8ce96672f9ec117162e28b1e03eb44b8b26b9d6bb567ece3401bfa280e86a7c6d0bdee539230ba3477199b74804f257ccd7f1e857721c5871721205e6ed8a

  • SSDEEP

    98304:xcy2LktHk9hBt5UWcVbCTNZHsBou4qeieZEg0NqG04gN:6y2LktHohBt5UWclQHsuc3eZEg0N0

Malware Config

Targets

    • Target

      25eb07ad9b26e94e1125ba19b2187009e975a94b3bbc166fb98e55da2a64d4cd

    • Size

      8.2MB

    • MD5

      e06e82769714f1de59d2473879d401ca

    • SHA1

      5a6f7d55e2e6b5197c5ab2f7c68beb662a8477a1

    • SHA256

      25eb07ad9b26e94e1125ba19b2187009e975a94b3bbc166fb98e55da2a64d4cd

    • SHA512

      94b8ce96672f9ec117162e28b1e03eb44b8b26b9d6bb567ece3401bfa280e86a7c6d0bdee539230ba3477199b74804f257ccd7f1e857721c5871721205e6ed8a

    • SSDEEP

      98304:xcy2LktHk9hBt5UWcVbCTNZHsBou4qeieZEg0NqG04gN:6y2LktHohBt5UWclQHsuc3eZEg0N0

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks