{"id":1409,"date":"2021-03-25T18:27:43","date_gmt":"2021-03-25T12:57:43","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1409"},"modified":"2021-06-07T11:06:01","modified_gmt":"2021-06-07T05:36:01","slug":"purple-fox-malware-exposed-windows-system-read-this-to-know","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/","title":{"rendered":"Purple Fox Malware Exposed Windows System \u2013 Read this to know!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Purple Fox malware was already known for transmitting over phishing emails and exploit kits, but now the malware is updated and it includes a worm module that gives the power to infect the Windows system using the Internet.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">This malware was first identified in 2018, as it infects about 30,000 devices and works as the downloaded that deploy other malware into the user&#8217;s system. This malware has the capabilities of rootkit and backdoor.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Purple Fox malware exploits module also caught when they targeted the Windows System and infect the users with the help of Web browsers and memory corruption that misuses the vulnerabilities present.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">In May 2020, the malware is responsible for 90,000 attacks and it is 600% more dangerous than others.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"936\" height=\"565\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-1.png\" alt=\"Purple Fox Malware Exposed Windows System \u2013 Read this to know!\" class=\"wp-image-1410\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-1.png 936w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-1-300x181.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-1-768x464.png 768w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How this Malware Used Using the Internet?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">According to the investigation, the activated port of scanning and exploitation are attempts on last year and it is based on telemetry data that was collected using the GGSN systems.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Once the malware is discovered on the exposed Windows system, it scanned for the reachable devices available on the Internet. However, Purple Fox uses a newly updated worm module that occupies SMB password and brute force to infect it.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, Purple Fox is been deployed its malware droppers and other additional modules that work on the extensive network of bots and they have an army of around 2000 compromised servers.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Multiple Devices that ate induced in this botnet may deal with the Windows Server Machine that is executed on the IIS version of 7.5 and Microsoft FTP, it also includes the Microsoft SQL Server 2008 R2 and Microsoft HTTP API httpd2.0, and Microsoft Terminal Service.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">This updated malware Purple Fox adopted worm-like behavior that permits the attackers to infect the servers by brute-forcing it and make it vulnerable Internet that exposed SMB services and it also used the phishing campaign and web browser vulnerabilities that deploy the payloads.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to the research, the infrastructure used makes the vulnerabilities Hodge-podge and exploited the server that hosts the initial payloads of the malware which further infects the machines which are using the server as a node of worming campaigns and these server infrastructures are appears and related to the other malware campaigns.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-2-1.jpg\" alt=\"Purple Fox Malware Exposed Windows System \u2013 Read this to know!\" class=\"wp-image-1413\" width=\"840\" height=\"567\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-2-1.jpg 884w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-2-1-300x203.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-image-2-1-768x519.jpg 768w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How this Malware Works?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">The malware is executed before infecting the devices and obtaining the persistence, this Purple Fox malware also downloads the rootkit module that accesses the hidden open-source rootkit applications and dropped files and folders while creating the Windows registry and infecting the systems.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Once the malware is started deploying the rootkit and rebooting the device, it will automatically rename the DLL file that matched the Windows system DLL and will configure the system at the time of launching.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The malware is executed into the system launch and each time it will infect the system, it uses the subsequent behavior of worm that continuously scanned the Internet and other targets that attempts while compromising it and add the botnet.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">As the machine sends the response to the SMB probes that it will automatically be sent it using port 445 and it will also authenticate the SMB by bruting and forcing the usernames and password or it also executed the null sessions.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">In case the authentication is successful then the malware will create a service that is the same as the name that matches with the regex ACo[0-9]{1} and AC01, AC02, AC05 and it will start downloading the MSI installation package from the HTTP servers and it will complete the infection loop.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Purple Fox malware was already known for transmitting over phishing emails and exploit kits, but now the malware is updated and it includes a worm module that gives the power to infect the Windows system using the Internet. This malware was first identified in 2018, as it infects about 30,000 devices and works as the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1512,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Purple Fox Malware Exposed Windows System \u2013 Read this to know! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Purple Fox Malware Exposed Windows System \u2013 Read this to know! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Purple Fox malware was already known for transmitting over phishing emails and exploit kits, but now the malware is updated and it includes a worm module that gives the power to infect the Windows system using the Internet. This malware was first identified in 2018, as it infects about 30,000 devices and works as the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-25T12:57:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:36:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Purple Fox Malware Exposed Windows System \u2013 Read this to know!\",\"datePublished\":\"2021-03-25T12:57:43+00:00\",\"dateModified\":\"2021-06-07T05:36:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\"},\"wordCount\":584,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\",\"url\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\",\"name\":\"Purple Fox Malware Exposed Windows System \u2013 Read this to know! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-03-25T12:57:43+00:00\",\"dateModified\":\"2021-06-07T05:36:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Purple Fox Malware Exposed Windows System \u2013 Read this to know!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Purple Fox Malware Exposed Windows System \u2013 Read this to know! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Purple Fox Malware Exposed Windows System \u2013 Read this to know! - Xiarch Solutions Private Limited","og_description":"Purple Fox malware was already known for transmitting over phishing emails and exploit kits, but now the malware is updated and it includes a worm module that gives the power to infect the Windows system using the Internet. This malware was first identified in 2018, as it infects about 30,000 devices and works as the [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-03-25T12:57:43+00:00","article_modified_time":"2021-06-07T05:36:01+00:00","og_image":[{"width":1000,"height":520,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/purple-fox-malware-featured-image.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Purple Fox Malware Exposed Windows System \u2013 Read this to know!","datePublished":"2021-03-25T12:57:43+00:00","dateModified":"2021-06-07T05:36:01+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/"},"wordCount":584,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/","url":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/","name":"Purple Fox Malware Exposed Windows System \u2013 Read this to know! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-03-25T12:57:43+00:00","dateModified":"2021-06-07T05:36:01+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/purple-fox-malware-exposed-windows-system-read-this-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Purple Fox Malware Exposed Windows System \u2013 Read this to know!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1409"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1409"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1409\/revisions"}],"predecessor-version":[{"id":1415,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1409\/revisions\/1415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1512"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}