General
-
Target
kugou_yinyue-X64.msi.vir
-
Size
115.7MB
-
Sample
241118-gr25yszmgw
-
MD5
8264ac335dd2c9b6f3c22826833eef9a
-
SHA1
6b45e44fb10381e96e5cba2004bfbc08a3eec3cd
-
SHA256
4defef20d0c620fcc1743147f44a244fa7c61b484a5ca5cfb8f60e99e970a7a2
-
SHA512
1a65be0f908edabe532232193cab034921065ff4fb898637b1c82a17d29874335758c93f779b7666384c0d6e6fe4eb46b5a6882986d6b742dd1a8be0e1df2fbb
-
SSDEEP
3145728:rydOHVo966Gx85U9YwMWYA2/8JZVtG37GDOUaDZjfFSfho:0H1GxkcBrYt/8J8SarDZ7FSfu
Static task
static1
Behavioral task
behavioral1
Sample
kugou_yinyue-X64.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kugou_yinyue-X64.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
kugou_yinyue-X64.msi.vir
-
Size
115.7MB
-
MD5
8264ac335dd2c9b6f3c22826833eef9a
-
SHA1
6b45e44fb10381e96e5cba2004bfbc08a3eec3cd
-
SHA256
4defef20d0c620fcc1743147f44a244fa7c61b484a5ca5cfb8f60e99e970a7a2
-
SHA512
1a65be0f908edabe532232193cab034921065ff4fb898637b1c82a17d29874335758c93f779b7666384c0d6e6fe4eb46b5a6882986d6b742dd1a8be0e1df2fbb
-
SSDEEP
3145728:rydOHVo966Gx85U9YwMWYA2/8JZVtG37GDOUaDZjfFSfho:0H1GxkcBrYt/8J8SarDZ7FSfu
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-