General

  • Target

    9c7adae4d239bbb5c76546b6618e7297b0fcdbe9ac13da8b482b5a08b5605954

  • Size

    4.7MB

  • Sample

    250331-y7w3baznx9

  • MD5

    e6347c2f9b07577fdbb7e6f0cd89a8eb

  • SHA1

    3584461a721c4dbb5747c7b05b78753ef33e2527

  • SHA256

    9c7adae4d239bbb5c76546b6618e7297b0fcdbe9ac13da8b482b5a08b5605954

  • SHA512

    2706cb56283d7adcd480ab0b29242c27e176fe753d7dfca3603304579b4f506fab2cc9920eff7aef4766f59951342b2cf00caa113e1b25b74c4e3b0cb0a48a01

  • SSDEEP

    49152:eCwsbCANnKXferL7Vwe/Gg0P+WhDDmn2J5+HhTEwo4Am7yqMDOon4ACARz0CvlLv:Zws2ANnKXOaeOgmhDDmn2twAwyLKclLv

Malware Config

Targets

    • Target

      9c7adae4d239bbb5c76546b6618e7297b0fcdbe9ac13da8b482b5a08b5605954

    • Size

      4.7MB

    • MD5

      e6347c2f9b07577fdbb7e6f0cd89a8eb

    • SHA1

      3584461a721c4dbb5747c7b05b78753ef33e2527

    • SHA256

      9c7adae4d239bbb5c76546b6618e7297b0fcdbe9ac13da8b482b5a08b5605954

    • SHA512

      2706cb56283d7adcd480ab0b29242c27e176fe753d7dfca3603304579b4f506fab2cc9920eff7aef4766f59951342b2cf00caa113e1b25b74c4e3b0cb0a48a01

    • SSDEEP

      49152:eCwsbCANnKXferL7Vwe/Gg0P+WhDDmn2J5+HhTEwo4Am7yqMDOon4ACARz0CvlLv:Zws2ANnKXOaeOgmhDDmn2twAwyLKclLv

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks