General

  • Target

    3e8c361167675e7ac80ff53bd2ffd55c722de81455f040db81aaea1240a60b59

  • Size

    6.9MB

  • Sample

    250420-lf4a4atps8

  • MD5

    d4f77f736f2b00a222a0a66459e347c7

  • SHA1

    4785ce11ee90e1c1abb9ad2d33f00d89e4f660df

  • SHA256

    3e8c361167675e7ac80ff53bd2ffd55c722de81455f040db81aaea1240a60b59

  • SHA512

    5be61dfd406bfa3b0ecfd2ff16a8e21155219b78cacace9216a8bc57f31f8a560528c4cfeaecc172f33d50bb862d4121793bea65fd17a704a2d6b1e10a098f6e

  • SSDEEP

    196608:+KXbeO7VmncKlhE9U6476itR+mLPw6lyZY61:T7VVKv647n+YlmY2

Malware Config

Targets

    • Target

      3e8c361167675e7ac80ff53bd2ffd55c722de81455f040db81aaea1240a60b59

    • Size

      6.9MB

    • MD5

      d4f77f736f2b00a222a0a66459e347c7

    • SHA1

      4785ce11ee90e1c1abb9ad2d33f00d89e4f660df

    • SHA256

      3e8c361167675e7ac80ff53bd2ffd55c722de81455f040db81aaea1240a60b59

    • SHA512

      5be61dfd406bfa3b0ecfd2ff16a8e21155219b78cacace9216a8bc57f31f8a560528c4cfeaecc172f33d50bb862d4121793bea65fd17a704a2d6b1e10a098f6e

    • SSDEEP

      196608:+KXbeO7VmncKlhE9U6476itR+mLPw6lyZY61:T7VVKv647n+YlmY2

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks