General

  • Target

    ab6bd75d672429a1ecbe7010082b3455b2b0b24952554788a5d1b33af0c77531.exe.vir

  • Size

    26.2MB

  • Sample

    241120-bfk5eawhqb

  • MD5

    e9a61d220a0df35ea009b602eec9a9a7

  • SHA1

    e9ef755041a907cd394d23da33784ab4a12c75a7

  • SHA256

    ab6bd75d672429a1ecbe7010082b3455b2b0b24952554788a5d1b33af0c77531

  • SHA512

    de8787231952a993f0c98c8f5268e171aa7c34b7722ed36e4ab4e418e116b67bab455069ce3507e5df3c9d66831b9c0f423bde6c8573161530e3f90a66a0b266

  • SSDEEP

    393216:kgIRvV8Y6xX3F+Gt/SArbLAE+/HnC/XZ1LF8HhZhpVLiQ2V8BWmy9DEtNhE:D6OY6pBSArYLC/p1Lg/pVOhyBS9ehE

Malware Config

Targets

    • Target

      ab6bd75d672429a1ecbe7010082b3455b2b0b24952554788a5d1b33af0c77531.exe.vir

    • Size

      26.2MB

    • MD5

      e9a61d220a0df35ea009b602eec9a9a7

    • SHA1

      e9ef755041a907cd394d23da33784ab4a12c75a7

    • SHA256

      ab6bd75d672429a1ecbe7010082b3455b2b0b24952554788a5d1b33af0c77531

    • SHA512

      de8787231952a993f0c98c8f5268e171aa7c34b7722ed36e4ab4e418e116b67bab455069ce3507e5df3c9d66831b9c0f423bde6c8573161530e3f90a66a0b266

    • SSDEEP

      393216:kgIRvV8Y6xX3F+Gt/SArbLAE+/HnC/XZ1LF8HhZhpVLiQ2V8BWmy9DEtNhE:D6OY6pBSArYLC/p1Lg/pVOhyBS9ehE

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks