General

  • Target

    WPS Office_104693057_401556.msi.v

  • Size

    13.0MB

  • Sample

    240910-q91jhswfpl

  • MD5

    a8f0f41ccc09254856bc1bbd2151a15d

  • SHA1

    4926bf9e1ca27835ee5a077565979111614c3e25

  • SHA256

    745ae5ef809909bdda166d758a529907f4175f3131c451717ca22a536eec57a9

  • SHA512

    8371939ad373cb6b6a5bf2cc20158fd60e7ebf91bdc67e8326d63d12aac7efd2600296e52ef1b5ef7acaa8f061a343e3ad45b5f7c1f8ff72f2113ce1f0815524

  • SSDEEP

    393216:oGS3skS0F5Ky7pfJY/+LXwwhCtZRZ5bz/ueWr8bf:oG8S0F5N7pfJu2XwwhYZRDbz/uFUf

Malware Config

Targets

    • Target

      WPS Office_104693057_401556.msi.v

    • Size

      13.0MB

    • MD5

      a8f0f41ccc09254856bc1bbd2151a15d

    • SHA1

      4926bf9e1ca27835ee5a077565979111614c3e25

    • SHA256

      745ae5ef809909bdda166d758a529907f4175f3131c451717ca22a536eec57a9

    • SHA512

      8371939ad373cb6b6a5bf2cc20158fd60e7ebf91bdc67e8326d63d12aac7efd2600296e52ef1b5ef7acaa8f061a343e3ad45b5f7c1f8ff72f2113ce1f0815524

    • SSDEEP

      393216:oGS3skS0F5Ky7pfJY/+LXwwhCtZRZ5bz/ueWr8bf:oG8S0F5N7pfJu2XwwhYZRDbz/uFUf

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks