General

  • Target

    ea699cb1c1c17b0e23e9311f13cc7cc956b4561433ab2f884885db7e2472654a

  • Size

    840KB

  • Sample

    250208-q9e8kszmhr

  • MD5

    4ed34f731afb121409605b3b84ee97b2

  • SHA1

    c75930cae82f86257396372ed95f0ca3fb85fe4a

  • SHA256

    ea699cb1c1c17b0e23e9311f13cc7cc956b4561433ab2f884885db7e2472654a

  • SHA512

    6be774ca4b0aca8c1ec58d5c6c69dc38361eff7487ea98b7586b24c2ce4bcdf877fe21250254f90f66537c87bcf59edf5bb54ff7e320638935331c1e5fb61fc2

  • SSDEEP

    24576:1z5IE72LxXgzQgC8iXn8m0hpwTe5Wm84SLnxjpaoilfF:FOLpmi8iXn8m4Rcm8L9jpxil

Malware Config

Targets

    • Target

      ea699cb1c1c17b0e23e9311f13cc7cc956b4561433ab2f884885db7e2472654a

    • Size

      840KB

    • MD5

      4ed34f731afb121409605b3b84ee97b2

    • SHA1

      c75930cae82f86257396372ed95f0ca3fb85fe4a

    • SHA256

      ea699cb1c1c17b0e23e9311f13cc7cc956b4561433ab2f884885db7e2472654a

    • SHA512

      6be774ca4b0aca8c1ec58d5c6c69dc38361eff7487ea98b7586b24c2ce4bcdf877fe21250254f90f66537c87bcf59edf5bb54ff7e320638935331c1e5fb61fc2

    • SSDEEP

      24576:1z5IE72LxXgzQgC8iXn8m0hpwTe5Wm84SLnxjpaoilfF:FOLpmi8iXn8m4Rcm8L9jpxil

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks