General

  • Target

    105f8868a28cd97eff34e3ad64ed1fe23878137907af35410ffdc2a5eceefa0c

  • Size

    7.6MB

  • Sample

    250420-lf4a4atps9

  • MD5

    787ab6c45b87c3df87d1d2b251eed3e0

  • SHA1

    4c51c1a544d3386217b9cf2b4d6f41e40f81168d

  • SHA256

    105f8868a28cd97eff34e3ad64ed1fe23878137907af35410ffdc2a5eceefa0c

  • SHA512

    20af7216a25beecc10131d26091b3fdf40dd4048f5a39aa575e7b2642427012036cc2b1fd9987e1a520056698a77dbc02f86f5813d12de2deb56af64cc06b4c5

  • SSDEEP

    196608:+KXbeO7Vmn+Avx2rw5Th8XeNyGtW0DJr5uDdQdWPet:T7VriiwTheeUGtW0yDwYet

Malware Config

Targets

    • Target

      105f8868a28cd97eff34e3ad64ed1fe23878137907af35410ffdc2a5eceefa0c

    • Size

      7.6MB

    • MD5

      787ab6c45b87c3df87d1d2b251eed3e0

    • SHA1

      4c51c1a544d3386217b9cf2b4d6f41e40f81168d

    • SHA256

      105f8868a28cd97eff34e3ad64ed1fe23878137907af35410ffdc2a5eceefa0c

    • SHA512

      20af7216a25beecc10131d26091b3fdf40dd4048f5a39aa575e7b2642427012036cc2b1fd9987e1a520056698a77dbc02f86f5813d12de2deb56af64cc06b4c5

    • SSDEEP

      196608:+KXbeO7Vmn+Avx2rw5Th8XeNyGtW0DJr5uDdQdWPet:T7VriiwTheeUGtW0yDwYet

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks