General

  • Target

    db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a

  • Size

    10.7MB

  • Sample

    250206-vkj8fsspgk

  • MD5

    fd7fe641e788cc04b66483e706881314

  • SHA1

    96e4ab063906026b2c88a13e6fdc4595489c891f

  • SHA256

    db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a

  • SHA512

    c6872064ea29bc5bb7b9c941f19a485ccb2b8b59fd2281a9eec4f06ef1546d2c84b56476d70af2df56f6f72bfcf5a115367e815e55b911ccf16225e209fbc77b

  • SSDEEP

    196608:CKXbeO71HfVFhBFRX9eQy7Mbz42Sbt2e1LQqbU/qG7jJVnGXTbllVq5L:f7TPBFR/y73bjQqcTj7uRlQ

Malware Config

Targets

    • Target

      db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a

    • Size

      10.7MB

    • MD5

      fd7fe641e788cc04b66483e706881314

    • SHA1

      96e4ab063906026b2c88a13e6fdc4595489c891f

    • SHA256

      db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a

    • SHA512

      c6872064ea29bc5bb7b9c941f19a485ccb2b8b59fd2281a9eec4f06ef1546d2c84b56476d70af2df56f6f72bfcf5a115367e815e55b911ccf16225e209fbc77b

    • SSDEEP

      196608:CKXbeO71HfVFhBFRX9eQy7Mbz42Sbt2e1LQqbU/qG7jJVnGXTbllVq5L:f7TPBFR/y73bjQqcTj7uRlQ

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks