General

  • Target

    f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc

  • Size

    2.6MB

  • Sample

    250331-y4mpgaznt5

  • MD5

    57308cf7a05a15b2eeb6e6b76531e39f

  • SHA1

    e7aa922074618d212fe660b7bf9838e63d399aec

  • SHA256

    f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc

  • SHA512

    09b8f82c1fcb2428575ef200607f7d8a137cb5d67a718680958e2dbf0668001714016b1ecbee874fa448241c9e8eba9c0501abaea032a0da58fb56437e26b26f

  • SSDEEP

    49152:eCwsbCANnKXferL7Vwe/Gg0P+WhDDmn2z:Zws2ANnKXOaeOgmhDDmn2z

Malware Config

Targets

    • Target

      f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc

    • Size

      2.6MB

    • MD5

      57308cf7a05a15b2eeb6e6b76531e39f

    • SHA1

      e7aa922074618d212fe660b7bf9838e63d399aec

    • SHA256

      f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc

    • SHA512

      09b8f82c1fcb2428575ef200607f7d8a137cb5d67a718680958e2dbf0668001714016b1ecbee874fa448241c9e8eba9c0501abaea032a0da58fb56437e26b26f

    • SSDEEP

      49152:eCwsbCANnKXferL7Vwe/Gg0P+WhDDmn2z:Zws2ANnKXOaeOgmhDDmn2z

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks