General

  • Target

    wpsupdate.msi.v

  • Size

    18.0MB

  • Sample

    240920-v2w9cayblc

  • MD5

    a73709d320e1160a965987bd3298b0bc

  • SHA1

    2b1942cad548a048f62eb643573baf671696c5ea

  • SHA256

    d5d245b5e9d6b56778fcad5bd8154779074e891df0455ae8cc77e14595f0df8c

  • SHA512

    78844102b9d83f5f8f3dc3c1b83217bb0a6a69579168dca0e4740afd1f9f4e8864b9203570b031e9ce47a8f9a2a6db98b558634708fd828727365f0271a5f686

  • SSDEEP

    393216:0vd1NDtHWaIhF5AfrpW4+SRxqwIxgFU1elj6iY9Q4mG3WX0X9Jnbx:0fWaIFaFWdqjle1xB99kC/nbx

Malware Config

Targets

    • Target

      wpsupdate.msi.v

    • Size

      18.0MB

    • MD5

      a73709d320e1160a965987bd3298b0bc

    • SHA1

      2b1942cad548a048f62eb643573baf671696c5ea

    • SHA256

      d5d245b5e9d6b56778fcad5bd8154779074e891df0455ae8cc77e14595f0df8c

    • SHA512

      78844102b9d83f5f8f3dc3c1b83217bb0a6a69579168dca0e4740afd1f9f4e8864b9203570b031e9ce47a8f9a2a6db98b558634708fd828727365f0271a5f686

    • SSDEEP

      393216:0vd1NDtHWaIhF5AfrpW4+SRxqwIxgFU1elj6iY9Q4mG3WX0X9Jnbx:0fWaIFaFWdqjle1xB99kC/nbx

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks