General

  • Target

    WPSOffice10469357401533.msi.v

  • Size

    41.1MB

  • Sample

    240922-q8hbjssgmd

  • MD5

    27ba48360e40e33e30f22f9258ca8aec

  • SHA1

    f86f07a4fde054f77591c7c42a751f4fa566cdd5

  • SHA256

    593c2deaacb09860822ec349224494c5aa35ebac3ff8836b43f63ad41d168d60

  • SHA512

    0ba2009808c661cc9780bdf437f2ca47cfb99daa080f95428f3631752d2f49f6fce1ec747ef9228e49e3df00db61b67d4f52c4411d76cb6551fb6f50eaf90497

  • SSDEEP

    786432:bz9YO2wwhIk3QM8g4fzggu4Pm7WJn8tKFodQrzRIwio026V:Fa3Qg4fzgh4fn8tKFeQr9tiod6V

Malware Config

Targets

    • Target

      WPSOffice10469357401533.msi.v

    • Size

      41.1MB

    • MD5

      27ba48360e40e33e30f22f9258ca8aec

    • SHA1

      f86f07a4fde054f77591c7c42a751f4fa566cdd5

    • SHA256

      593c2deaacb09860822ec349224494c5aa35ebac3ff8836b43f63ad41d168d60

    • SHA512

      0ba2009808c661cc9780bdf437f2ca47cfb99daa080f95428f3631752d2f49f6fce1ec747ef9228e49e3df00db61b67d4f52c4411d76cb6551fb6f50eaf90497

    • SSDEEP

      786432:bz9YO2wwhIk3QM8g4fzggu4Pm7WJn8tKFodQrzRIwio026V:Fa3Qg4fzgh4fn8tKFeQr9tiod6V

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks