General

  • Target

    ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb

  • Size

    1.9MB

  • Sample

    250119-pvpm2aykdk

  • MD5

    40c963d03dddf73814b2ac37fffc3ad9

  • SHA1

    3c193f74453da101fe17428962d31583cb87f7e2

  • SHA256

    ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb

  • SHA512

    77ca773418cfc325bb4fd33922eee414da3df56e317381c4e52e4d0312d413780e77285937c42743ac84295fba82b2bd00fc8a5be3d17fb4e76905902ca44644

  • SSDEEP

    49152:rxTc2H2tFvduySt6kYKy2Re589Y+wejfxYD2qQfs+RiieNXs:xcy2Lkt6kYec589YLeLxYD2qQfs+RsXs

Malware Config

Targets

    • Target

      ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb

    • Size

      1.9MB

    • MD5

      40c963d03dddf73814b2ac37fffc3ad9

    • SHA1

      3c193f74453da101fe17428962d31583cb87f7e2

    • SHA256

      ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb

    • SHA512

      77ca773418cfc325bb4fd33922eee414da3df56e317381c4e52e4d0312d413780e77285937c42743ac84295fba82b2bd00fc8a5be3d17fb4e76905902ca44644

    • SSDEEP

      49152:rxTc2H2tFvduySt6kYKy2Re589Y+wejfxYD2qQfs+RiieNXs:xcy2Lkt6kYec589YLeLxYD2qQfs+RsXs

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks