General

  • Target

    cf45886a07a4a11ff676b3b6a80f735eb629581a9248288c0c9c57086330e99b

  • Size

    1.9MB

  • Sample

    250119-yctzgasnbw

  • MD5

    e9be91561aaa0e80882246e50f4e86da

  • SHA1

    6904de6a9da6d9c301830c0c15a0952a1e3b8cca

  • SHA256

    cf45886a07a4a11ff676b3b6a80f735eb629581a9248288c0c9c57086330e99b

  • SHA512

    ea8bb230d36052af11b523738ef072be1557a58ad53a220883b72b10e47f00d325e7e83019ca2287e8b8e16b506fdf12aba92eacb1850a8a1d898d132ff57f7f

  • SSDEEP

    49152:8QZAdVyVT9n/Gg0P+WhoFpeu+ZPItx2apeapelI:9GdVyVT9nOgmhZuPtUvlI

Malware Config

Targets

    • Target

      cf45886a07a4a11ff676b3b6a80f735eb629581a9248288c0c9c57086330e99b

    • Size

      1.9MB

    • MD5

      e9be91561aaa0e80882246e50f4e86da

    • SHA1

      6904de6a9da6d9c301830c0c15a0952a1e3b8cca

    • SHA256

      cf45886a07a4a11ff676b3b6a80f735eb629581a9248288c0c9c57086330e99b

    • SHA512

      ea8bb230d36052af11b523738ef072be1557a58ad53a220883b72b10e47f00d325e7e83019ca2287e8b8e16b506fdf12aba92eacb1850a8a1d898d132ff57f7f

    • SSDEEP

      49152:8QZAdVyVT9n/Gg0P+WhoFpeu+ZPItx2apeapelI:9GdVyVT9nOgmhZuPtUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks