General

  • Target

    b64fc204940c66a6add977a0c67ae4a97df32060ccd1a542d01a2564e479e938

  • Size

    616KB

  • Sample

    250119-psslxayjfj

  • MD5

    be5e4218aec5b7d5bc07640e0142eeb4

  • SHA1

    727f7eb2a20a815a4dfaec198a5b9846e99c1ac3

  • SHA256

    b64fc204940c66a6add977a0c67ae4a97df32060ccd1a542d01a2564e479e938

  • SHA512

    a110c629ee7669f3caf67516b7ba27cebcf0ec43a51d00b1100a4539c97d448368adbbd1300b8cf95ee230a6f9c0b0bbd39f900dbac22681c019ddf97c597278

  • SSDEEP

    12288:/i2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8y9N7YC:/i2Tro2H2HESq2eWJ6MQjySjy9N77

Malware Config

Targets

    • Target

      b64fc204940c66a6add977a0c67ae4a97df32060ccd1a542d01a2564e479e938

    • Size

      616KB

    • MD5

      be5e4218aec5b7d5bc07640e0142eeb4

    • SHA1

      727f7eb2a20a815a4dfaec198a5b9846e99c1ac3

    • SHA256

      b64fc204940c66a6add977a0c67ae4a97df32060ccd1a542d01a2564e479e938

    • SHA512

      a110c629ee7669f3caf67516b7ba27cebcf0ec43a51d00b1100a4539c97d448368adbbd1300b8cf95ee230a6f9c0b0bbd39f900dbac22681c019ddf97c597278

    • SSDEEP

      12288:/i2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8y9N7YC:/i2Tro2H2HESq2eWJ6MQjySjy9N77

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks