General

  • Target

    a001c1109fbf3e7f0ac5936c132881ce24d775496e3f07dbbde35c8650704b96

  • Size

    3.1MB

  • Sample

    250420-lf3pkaz1hv

  • MD5

    bc4a6ed079b6cfba4e6856a7d7725bd0

  • SHA1

    1a8fc4cfc3e68b494cb56b0af9974c1147c8d52c

  • SHA256

    a001c1109fbf3e7f0ac5936c132881ce24d775496e3f07dbbde35c8650704b96

  • SHA512

    037b14316271753d88742f9032f9b78eecc53e20d6070154910db7e086a2eb2cc3bc4d7306f0145bb58143b626f8bda48e86b6d48f036f70e44fe27fd356480a

  • SSDEEP

    49152:6jwsbCANnKXferL7Vwe/Gg0P+WhoW9cDmn2gQN:gws2ANnKXOaeOgmhoWGDmn2gQN

Malware Config

Targets

    • Target

      a001c1109fbf3e7f0ac5936c132881ce24d775496e3f07dbbde35c8650704b96

    • Size

      3.1MB

    • MD5

      bc4a6ed079b6cfba4e6856a7d7725bd0

    • SHA1

      1a8fc4cfc3e68b494cb56b0af9974c1147c8d52c

    • SHA256

      a001c1109fbf3e7f0ac5936c132881ce24d775496e3f07dbbde35c8650704b96

    • SHA512

      037b14316271753d88742f9032f9b78eecc53e20d6070154910db7e086a2eb2cc3bc4d7306f0145bb58143b626f8bda48e86b6d48f036f70e44fe27fd356480a

    • SSDEEP

      49152:6jwsbCANnKXferL7Vwe/Gg0P+WhoW9cDmn2gQN:gws2ANnKXOaeOgmhoWGDmn2gQN

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks