General

  • Target

    e6a662024798f2ebcb230686ceb813b54d359f856db189ecd2654174c796c461

  • Size

    1.3MB

  • Sample

    250304-y184asznv7

  • MD5

    fef9cb634b5240f8a63c509cdb2f2978

  • SHA1

    b9a47bb6791bf3868e4aaa15126a612568375f5c

  • SHA256

    e6a662024798f2ebcb230686ceb813b54d359f856db189ecd2654174c796c461

  • SHA512

    1bf72ab1c1fc64f2269571a701ee8890f2f41df6884d63ee24d7a663fd906d0d384f4e42268628108ac47ca582fee5a53b5aca09b6c19511825c129cd5bc7ed6

  • SSDEEP

    24576:dOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN+:QHPkVOBTK

Malware Config

Targets

    • Target

      e6a662024798f2ebcb230686ceb813b54d359f856db189ecd2654174c796c461

    • Size

      1.3MB

    • MD5

      fef9cb634b5240f8a63c509cdb2f2978

    • SHA1

      b9a47bb6791bf3868e4aaa15126a612568375f5c

    • SHA256

      e6a662024798f2ebcb230686ceb813b54d359f856db189ecd2654174c796c461

    • SHA512

      1bf72ab1c1fc64f2269571a701ee8890f2f41df6884d63ee24d7a663fd906d0d384f4e42268628108ac47ca582fee5a53b5aca09b6c19511825c129cd5bc7ed6

    • SSDEEP

      24576:dOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN+:QHPkVOBTK

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks