General

  • Target

    d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b

  • Size

    2.4MB

  • Sample

    250419-km5xts1wcw

  • MD5

    6f887f4b8ae483d9aaa10f38b381d06b

  • SHA1

    2596dcee3a634dfc7c5f44194b5a7c57e7db4fcb

  • SHA256

    d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b

  • SHA512

    c79a3c9669657a8db050e081bb15c870a367175627fe2f34fa42c2d34fa11457d52309d52469eba1063e782ff96a660432b7e143a974daa78f3d0e9db3c67005

  • SSDEEP

    24576:tCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHe:tCwsbCANnKXferL7Vwe/Gg0P+WhJbP

Malware Config

Targets

    • Target

      d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b

    • Size

      2.4MB

    • MD5

      6f887f4b8ae483d9aaa10f38b381d06b

    • SHA1

      2596dcee3a634dfc7c5f44194b5a7c57e7db4fcb

    • SHA256

      d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b

    • SHA512

      c79a3c9669657a8db050e081bb15c870a367175627fe2f34fa42c2d34fa11457d52309d52469eba1063e782ff96a660432b7e143a974daa78f3d0e9db3c67005

    • SSDEEP

      24576:tCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHe:tCwsbCANnKXferL7Vwe/Gg0P+WhJbP

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks