General

  • Target

    50682bb6ccf5da1ed1d20db6fe254f78f2f5d20985637fa4b5764956b00d4a8a

  • Size

    13.9MB

  • Sample

    240921-xvdvjayfkl

  • MD5

    247fc0f0960b4d5ea6074328ec7a2252

  • SHA1

    a413083933b2c30bb507f145e25a79429906540f

  • SHA256

    50682bb6ccf5da1ed1d20db6fe254f78f2f5d20985637fa4b5764956b00d4a8a

  • SHA512

    9081e53c5beb6be92d4e6f9811324a50971f93f0255b4733edfe1355133c27b3587e65f3e9847c28b761a1d39e56544496feb0a73d57f1a9e723dc4940f84433

  • SSDEEP

    393216:1MoM73gR0dtGA5kMcfwVRqCo/YBPw+mPcegN7in:1MofR0dt55kvwjqCo/YZw+mPm1in

Malware Config

Targets

    • Target

      VLC2.7.msi

    • Size

      14.0MB

    • MD5

      a1c5d32005ee62baa30dc993394aa17c

    • SHA1

      360dd1889252cc5c06386706f5d9f8f326f218db

    • SHA256

      49d8edfd8a93ede3e3087771d69b7e6be33f53dfb92ee1da9d82c09f2e0d3188

    • SHA512

      3ae8fcf6120e9c2a518b109c64996cea7d5b8f28df1e00c6e18a74b199d4f80d44e2c647fddb22b6b5ab3e24a495366be21d1a140521c00db35dd9e3480c4124

    • SSDEEP

      393216:sGS3skS0F5Ky7pfJY/+LXwwhCtZRZ5bz/ueWBem1f4V:sG8S0F5N7pfJu2XwwhYZRDbz/uFdp4V

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks