Rewterz Threat Alert – Purple Fox Rootkit Distributed Using Malicious Telegram Installer – Active IOCs
Severity
Medium
Analysis Summary
This sophisticated attack delivers the Purple Fox Rootkit by dividing the attack process into multiple separate stages that are useless unless the entire file set is present.
A malicious script “Telegram Desktop.exe” is an Autolt script which runs to create a new folder “TextInputh” that drops a malicious downloader with the same name.
Then TextInputh.exe creates a new folder 1640618495 the video directory that contacts the C&C server to download two files:
1.rar
7zz.exe
TextInputh.exe executes the ojbk.exe that runs with the “-a” argument to load the malicious 360.dll file.
Next the svchost.txt runs to drop five more files:
Calldriver.exe
Driver.sys
dll.dll
kill.bat
speedmem2.hg
These files work together to shut down and block 360 AV processes from the kernel space. This later installs the Purple Fox Rootkit.
Following information is gathered by the malware and sent to the C&C:
Hostname
CPU – by retrieving a value of HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ ~MHz registry key
Memory status
Drive Type
Processor Type
The Purple Fox payloads are downloaded and executed next.
Purple Fox Rootkit File Creation Flow from Minerva Labs