General

  • Target

    wpsupdate.msi.v

  • Size

    39.8MB

  • Sample

    240922-nd3b5axarf

  • MD5

    0c200d7664b0e178560f7f974e6aff63

  • SHA1

    f3ed74c5aa91de36a4a978d949b8b76752c853b3

  • SHA256

    f6b23380267c21f4f82efee4573c1eae7d89c69ab293e10f58aa45478c1bf1b2

  • SHA512

    b26c8dada559121f48ac6f3f15511e26c465c60b9d7b9a9ead4b175e32f32e7a6adbb77ed8cca269a88081a043efc7413b7c1a008e39bf41a36b6a2cbf698920

  • SSDEEP

    786432:dHB67xVCEOhHxvCIEL2qf38CW9M4OGEuU/mH+ng2yI/9b+sKf:/KC9hm7/AXOBuU/mH+g/2y5

Malware Config

Targets

    • Target

      wpsupdate.msi.v

    • Size

      39.8MB

    • MD5

      0c200d7664b0e178560f7f974e6aff63

    • SHA1

      f3ed74c5aa91de36a4a978d949b8b76752c853b3

    • SHA256

      f6b23380267c21f4f82efee4573c1eae7d89c69ab293e10f58aa45478c1bf1b2

    • SHA512

      b26c8dada559121f48ac6f3f15511e26c465c60b9d7b9a9ead4b175e32f32e7a6adbb77ed8cca269a88081a043efc7413b7c1a008e39bf41a36b6a2cbf698920

    • SSDEEP

      786432:dHB67xVCEOhHxvCIEL2qf38CW9M4OGEuU/mH+ng2yI/9b+sKf:/KC9hm7/AXOBuU/mH+g/2y5

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks