General

  • Target

    4c0121f4b1fd3c3a906e08b60c245e56077019b333d240a0508f59c3500a0f20

  • Size

    604KB

  • Sample

    250209-gtxm9aypgm

  • MD5

    e382e0f794e90bae0baad8412f77c23d

  • SHA1

    1d52a424962f3deab2374a5dd7052bbe35703a1a

  • SHA256

    4c0121f4b1fd3c3a906e08b60c245e56077019b333d240a0508f59c3500a0f20

  • SHA512

    405fea32ee0a3b9136efe406911a5d637ea16db503abc80c48142321592f9fae26552f2fabb1b5c29542381022bf78043eb35eabdf10b0e65c6bf4c8c66beb14

  • SSDEEP

    12288:mi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8yAkir:mi2Tro2H2HESq2eWJ6MQjySjysr

Malware Config

Targets

    • Target

      4c0121f4b1fd3c3a906e08b60c245e56077019b333d240a0508f59c3500a0f20

    • Size

      604KB

    • MD5

      e382e0f794e90bae0baad8412f77c23d

    • SHA1

      1d52a424962f3deab2374a5dd7052bbe35703a1a

    • SHA256

      4c0121f4b1fd3c3a906e08b60c245e56077019b333d240a0508f59c3500a0f20

    • SHA512

      405fea32ee0a3b9136efe406911a5d637ea16db503abc80c48142321592f9fae26552f2fabb1b5c29542381022bf78043eb35eabdf10b0e65c6bf4c8c66beb14

    • SSDEEP

      12288:mi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8yAkir:mi2Tro2H2HESq2eWJ6MQjySjysr

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks