General

  • Target

    b0dcbb32ee1106570f6438451c8fb9e9e6ffda54ff73bdd7779a8b156cd53150

  • Size

    1.4MB

  • Sample

    250119-pv7tlsxpa1

  • MD5

    406587050e6220d2db4819720e7d62e1

  • SHA1

    2692ea5a1497d0d0bd429b8546dad520432f44dd

  • SHA256

    b0dcbb32ee1106570f6438451c8fb9e9e6ffda54ff73bdd7779a8b156cd53150

  • SHA512

    87d3af61f6a95a3fe7e280dfad6d3ee2b7fffcb1a1a8b88908d3dbe46b53f0500927e588df0a0f314493216879e797a683e6125e5480f5ec46972039f899ee12

  • SSDEEP

    24576:Ui2Tro2H2HESq2eWJ6MQjySjysIrxSpwADf3qN1PvS:UxTc2H2tFvduySDIFGDf3qN1nS

Malware Config

Targets

    • Target

      b0dcbb32ee1106570f6438451c8fb9e9e6ffda54ff73bdd7779a8b156cd53150

    • Size

      1.4MB

    • MD5

      406587050e6220d2db4819720e7d62e1

    • SHA1

      2692ea5a1497d0d0bd429b8546dad520432f44dd

    • SHA256

      b0dcbb32ee1106570f6438451c8fb9e9e6ffda54ff73bdd7779a8b156cd53150

    • SHA512

      87d3af61f6a95a3fe7e280dfad6d3ee2b7fffcb1a1a8b88908d3dbe46b53f0500927e588df0a0f314493216879e797a683e6125e5480f5ec46972039f899ee12

    • SSDEEP

      24576:Ui2Tro2H2HESq2eWJ6MQjySjysIrxSpwADf3qN1PvS:UxTc2H2tFvduySDIFGDf3qN1nS

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks