General

  • Target

    sogou_pinyin_guanwang.exe.v

  • Size

    181.2MB

  • Sample

    241001-bnvc2stekj

  • MD5

    42b9b4f540a534b0b7db83e9aba9d90d

  • SHA1

    57b56ba1dd6f9cf41c181c631f8cf829bab80607

  • SHA256

    c1103842cdc46be114dff25ae7e3b59e2a014133945d68eaffe02e84b2078b02

  • SHA512

    8983df90e6952725b54495516dd328760f9c9e37162589a55c16db2986063d9e0644f47157e9786a473f9da9bb37a5ac74fcbd818493443d17536e1abbc424eb

  • SSDEEP

    3145728:A/kfnZZRUWXNShZNxlb3oeUFRGp/K3GgUCoQKAQ6h398AWXNOQ14BDndvdXi37Dk:jnTLXwXNf4eUSJK39U8KAQ6hN8AW9H1m

Malware Config

Targets

    • Target

      sogou_pinyin_guanwang.exe.v

    • Size

      181.2MB

    • MD5

      42b9b4f540a534b0b7db83e9aba9d90d

    • SHA1

      57b56ba1dd6f9cf41c181c631f8cf829bab80607

    • SHA256

      c1103842cdc46be114dff25ae7e3b59e2a014133945d68eaffe02e84b2078b02

    • SHA512

      8983df90e6952725b54495516dd328760f9c9e37162589a55c16db2986063d9e0644f47157e9786a473f9da9bb37a5ac74fcbd818493443d17536e1abbc424eb

    • SSDEEP

      3145728:A/kfnZZRUWXNShZNxlb3oeUFRGp/K3GgUCoQKAQ6h398AWXNOQ14BDndvdXi37Dk:jnTLXwXNf4eUSJK39U8KAQ6hN8AW9H1m

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks