General

  • Target

    e914901d16f7e51ccb594dfb366ecef153ca9b0bbeb92a34d976f8be0b7ac77d

  • Size

    2.5MB

  • Sample

    250219-2t3jqa1jhx

  • MD5

    e3b7145562f03d8f0b08d865656b39a6

  • SHA1

    f43a9ba7b3a2ca9a91f330d77d05d0e032c0e478

  • SHA256

    e914901d16f7e51ccb594dfb366ecef153ca9b0bbeb92a34d976f8be0b7ac77d

  • SHA512

    855640d6f438fc1bd75b19d719ae788ffc7880fca9fa26925e349e160eadb8cb8fd151cbc2fbc9eb43ee589bf1244dc06d81bf80bfcca3cc63c02db86ed72fcf

  • SSDEEP

    24576:rCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHl:rCwsbCANnKXferL7Vwe/Gg0P+WhS

Malware Config

Targets

    • Target

      e914901d16f7e51ccb594dfb366ecef153ca9b0bbeb92a34d976f8be0b7ac77d

    • Size

      2.5MB

    • MD5

      e3b7145562f03d8f0b08d865656b39a6

    • SHA1

      f43a9ba7b3a2ca9a91f330d77d05d0e032c0e478

    • SHA256

      e914901d16f7e51ccb594dfb366ecef153ca9b0bbeb92a34d976f8be0b7ac77d

    • SHA512

      855640d6f438fc1bd75b19d719ae788ffc7880fca9fa26925e349e160eadb8cb8fd151cbc2fbc9eb43ee589bf1244dc06d81bf80bfcca3cc63c02db86ed72fcf

    • SSDEEP

      24576:rCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHl:rCwsbCANnKXferL7Vwe/Gg0P+WhS

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks