General

  • Target

    891a8f128440e08a34379b6b9c0674dd2600d82efe911136c5ce001bbb695e45

  • Size

    1.8MB

  • Sample

    250123-3sr72ayqex

  • MD5

    94bbf82d89ccb6b454a3fe7db782a998

  • SHA1

    e92f16d611e82e471d763a4a8f4fcb9421baf769

  • SHA256

    891a8f128440e08a34379b6b9c0674dd2600d82efe911136c5ce001bbb695e45

  • SHA512

    5ec961bdfc6c7a0465ff8bc5fe2f9cddc69795a08123a654226f1b42c31dd64f2aaca188088f57e779ce2518764378fd5d9f48f327ca6cf5c5ba23c0fa1c7180

  • SSDEEP

    24576:7QZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV0Tdy764qNGg7MQT:7QZAdVyVT9n/Gg0P+WhoC64qNp7

Malware Config

Targets

    • Target

      891a8f128440e08a34379b6b9c0674dd2600d82efe911136c5ce001bbb695e45

    • Size

      1.8MB

    • MD5

      94bbf82d89ccb6b454a3fe7db782a998

    • SHA1

      e92f16d611e82e471d763a4a8f4fcb9421baf769

    • SHA256

      891a8f128440e08a34379b6b9c0674dd2600d82efe911136c5ce001bbb695e45

    • SHA512

      5ec961bdfc6c7a0465ff8bc5fe2f9cddc69795a08123a654226f1b42c31dd64f2aaca188088f57e779ce2518764378fd5d9f48f327ca6cf5c5ba23c0fa1c7180

    • SSDEEP

      24576:7QZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV0Tdy764qNGg7MQT:7QZAdVyVT9n/Gg0P+WhoC64qNp7

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks