General

  • Target

    WPS Office_104693057_401535.msi.v

  • Size

    15.4MB

  • Sample

    240920-e3qvysycqb

  • MD5

    ca9086b9f4e1cbfae86204a0e2cbea07

  • SHA1

    4fb147699ab8b80fc6b89d9d1473bfb60dbd2a15

  • SHA256

    21a2e0d27dfe4f70d74e0be94a1700cbc0e58c87553f1140253109ab0d9701b2

  • SHA512

    b1f89f9342df8de10eaa1134eb9982942cee26abebf280b80a79b37f26e1f2b55de999d36249a731385c5a72bb2c3dd8b9b14f578263d3037799a1617279e984

  • SSDEEP

    393216:WAxJ3qt2MkEOEsQ+D8PjbtTBQqc4dq47aJ7IKw9M38hoTjZ5Uu0H:WU3o2NNjgrpFQq3dd7aJkvFhoTrV0H

Malware Config

Targets

    • Target

      WPS Office_104693057_401535.msi.v

    • Size

      15.4MB

    • MD5

      ca9086b9f4e1cbfae86204a0e2cbea07

    • SHA1

      4fb147699ab8b80fc6b89d9d1473bfb60dbd2a15

    • SHA256

      21a2e0d27dfe4f70d74e0be94a1700cbc0e58c87553f1140253109ab0d9701b2

    • SHA512

      b1f89f9342df8de10eaa1134eb9982942cee26abebf280b80a79b37f26e1f2b55de999d36249a731385c5a72bb2c3dd8b9b14f578263d3037799a1617279e984

    • SSDEEP

      393216:WAxJ3qt2MkEOEsQ+D8PjbtTBQqc4dq47aJ7IKw9M38hoTjZ5Uu0H:WU3o2NNjgrpFQq3dd7aJkvFhoTrV0H

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks