General

  • Target

    5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867

  • Size

    3.2MB

  • Sample

    250419-khrvea1te1

  • MD5

    b1a06f3a1470fbc4766e1451fe761699

  • SHA1

    0a5a9e5106dacd4b272be9496b6508b112674323

  • SHA256

    5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867

  • SHA512

    66e12141ed188a9a3b50b884591e69fa2a52077597055f1a58a0b0be4d3b3a49a6071e3bc090a652907a9b6842f53946ae812b7a64bc31fd60b4ac1870675fb3

  • SSDEEP

    49152:BCwsbCANnKXferL7Vwe/Gg0P+WhPbv3HM8lWI7eP:sws2ANnKXOaeOgmhjPJlWI7eP

Malware Config

Targets

    • Target

      5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867

    • Size

      3.2MB

    • MD5

      b1a06f3a1470fbc4766e1451fe761699

    • SHA1

      0a5a9e5106dacd4b272be9496b6508b112674323

    • SHA256

      5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867

    • SHA512

      66e12141ed188a9a3b50b884591e69fa2a52077597055f1a58a0b0be4d3b3a49a6071e3bc090a652907a9b6842f53946ae812b7a64bc31fd60b4ac1870675fb3

    • SSDEEP

      49152:BCwsbCANnKXferL7Vwe/Gg0P+WhPbv3HM8lWI7eP:sws2ANnKXOaeOgmhjPJlWI7eP

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks