General

  • Target

    f75cba36398f2ffa1994b95249261c9269d3b17c8d26df51c82a6a0a7796f7ed

  • Size

    1.7MB

  • Sample

    250128-hlnaaa1man

  • MD5

    6ad2f29da646bc7f2d71f284f707df78

  • SHA1

    7e81d68bca10c7eb12701d1803f15f58a29b9c3c

  • SHA256

    f75cba36398f2ffa1994b95249261c9269d3b17c8d26df51c82a6a0a7796f7ed

  • SHA512

    8a004d8dcfda6fb47c6f0886bb558dfdb4161a47c8a915dfee25d6f1228724cf83319364112c1f3183e95c68463f5cd8d9caad9343687a3e53c50dd875f4ae93

  • SSDEEP

    24576:LQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVR4cQL8u8:LQZAdVyVT9n/Gg0P+WhoI4H8

Malware Config

Targets

    • Target

      f75cba36398f2ffa1994b95249261c9269d3b17c8d26df51c82a6a0a7796f7ed

    • Size

      1.7MB

    • MD5

      6ad2f29da646bc7f2d71f284f707df78

    • SHA1

      7e81d68bca10c7eb12701d1803f15f58a29b9c3c

    • SHA256

      f75cba36398f2ffa1994b95249261c9269d3b17c8d26df51c82a6a0a7796f7ed

    • SHA512

      8a004d8dcfda6fb47c6f0886bb558dfdb4161a47c8a915dfee25d6f1228724cf83319364112c1f3183e95c68463f5cd8d9caad9343687a3e53c50dd875f4ae93

    • SSDEEP

      24576:LQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVR4cQL8u8:LQZAdVyVT9n/Gg0P+WhoI4H8

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks