General

  • Target

    3fe14a72b7a018e94437c1f147b96bff995695ef0b9e61a53096d52a2cbcbddc

  • Size

    1.4MB

  • Sample

    250119-pta39ayjhn

  • MD5

    aa0a6368da03e88adc6808c98a0695c1

  • SHA1

    7cfe5ccc381cfb8eea1a82f3533dfd018d170385

  • SHA256

    3fe14a72b7a018e94437c1f147b96bff995695ef0b9e61a53096d52a2cbcbddc

  • SHA512

    fbe3cae047039b7d5b84cedec8fc38c71ae411ced366d65f03703e7ab9e9d884136594e12cccb741acd18ac8e0d82008dfdd037c0cc76bda2bea0c656142e3d3

  • SSDEEP

    24576:ri2Tro2H2HESq2eWJ6MQjySjykVOUcNHIkkxNdeLG8XhBtMU3KHvINRSIB7TFYvq:rxTc2H2tFvduyStVOCKGwhBtMUm/yTy

Malware Config

Targets

    • Target

      3fe14a72b7a018e94437c1f147b96bff995695ef0b9e61a53096d52a2cbcbddc

    • Size

      1.4MB

    • MD5

      aa0a6368da03e88adc6808c98a0695c1

    • SHA1

      7cfe5ccc381cfb8eea1a82f3533dfd018d170385

    • SHA256

      3fe14a72b7a018e94437c1f147b96bff995695ef0b9e61a53096d52a2cbcbddc

    • SHA512

      fbe3cae047039b7d5b84cedec8fc38c71ae411ced366d65f03703e7ab9e9d884136594e12cccb741acd18ac8e0d82008dfdd037c0cc76bda2bea0c656142e3d3

    • SSDEEP

      24576:ri2Tro2H2HESq2eWJ6MQjySjykVOUcNHIkkxNdeLG8XhBtMU3KHvINRSIB7TFYvq:rxTc2H2tFvduyStVOCKGwhBtMUm/yTy

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks