General

  • Target

    kugou_yinyue-X64.msi.vir

  • Size

    115.7MB

  • Sample

    241118-gr25yszmgw

  • MD5

    8264ac335dd2c9b6f3c22826833eef9a

  • SHA1

    6b45e44fb10381e96e5cba2004bfbc08a3eec3cd

  • SHA256

    4defef20d0c620fcc1743147f44a244fa7c61b484a5ca5cfb8f60e99e970a7a2

  • SHA512

    1a65be0f908edabe532232193cab034921065ff4fb898637b1c82a17d29874335758c93f779b7666384c0d6e6fe4eb46b5a6882986d6b742dd1a8be0e1df2fbb

  • SSDEEP

    3145728:rydOHVo966Gx85U9YwMWYA2/8JZVtG37GDOUaDZjfFSfho:0H1GxkcBrYt/8J8SarDZ7FSfu

Malware Config

Targets

    • Target

      kugou_yinyue-X64.msi.vir

    • Size

      115.7MB

    • MD5

      8264ac335dd2c9b6f3c22826833eef9a

    • SHA1

      6b45e44fb10381e96e5cba2004bfbc08a3eec3cd

    • SHA256

      4defef20d0c620fcc1743147f44a244fa7c61b484a5ca5cfb8f60e99e970a7a2

    • SHA512

      1a65be0f908edabe532232193cab034921065ff4fb898637b1c82a17d29874335758c93f779b7666384c0d6e6fe4eb46b5a6882986d6b742dd1a8be0e1df2fbb

    • SSDEEP

      3145728:rydOHVo966Gx85U9YwMWYA2/8JZVtG37GDOUaDZjfFSfho:0H1GxkcBrYt/8J8SarDZ7FSfu

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks