General

  • Target

    3f90720904fd29379e4dbc9c60eebae08cbaae5a362795eacf75f5e7b5016e89.msi.vir

  • Size

    242.2MB

  • Sample

    241109-smw9pazkfn

  • MD5

    e2233f04bb29e57211adcb23e445297d

  • SHA1

    0c8d7bc39e08c2f4fc6d7875acc26632f59f8934

  • SHA256

    3f90720904fd29379e4dbc9c60eebae08cbaae5a362795eacf75f5e7b5016e89

  • SHA512

    94fda256ffa2f5465801d6d25d0d275b91a96db0128f7a04fb29ea5806fbf68a88365b0b56e28fbc02ade39fadee6acee25dba0aafa496a3681b44042754c815

  • SSDEEP

    6291456:OAstz7u+q1tSqUAwMoa22c04tV+Jvw9DdD:OAiz7Xq1JHwMDLcduvmDZ

Malware Config

Targets

    • Target

      3f90720904fd29379e4dbc9c60eebae08cbaae5a362795eacf75f5e7b5016e89.msi.vir

    • Size

      242.2MB

    • MD5

      e2233f04bb29e57211adcb23e445297d

    • SHA1

      0c8d7bc39e08c2f4fc6d7875acc26632f59f8934

    • SHA256

      3f90720904fd29379e4dbc9c60eebae08cbaae5a362795eacf75f5e7b5016e89

    • SHA512

      94fda256ffa2f5465801d6d25d0d275b91a96db0128f7a04fb29ea5806fbf68a88365b0b56e28fbc02ade39fadee6acee25dba0aafa496a3681b44042754c815

    • SSDEEP

      6291456:OAstz7u+q1tSqUAwMoa22c04tV+Jvw9DdD:OAiz7Xq1JHwMDLcduvmDZ

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks