General

  • Target

    39f3450dc1503693b8b8ecc736a66cb63674b77ea50ee68a52624209f6193081

  • Size

    2.0MB

  • Sample

    241120-qk8tlaxgnk

  • MD5

    27e74ec0b731e1cd1a4426ef0946507d

  • SHA1

    a1a53f5d8352c209b761918d1655cd1bf741ca7e

  • SHA256

    39f3450dc1503693b8b8ecc736a66cb63674b77ea50ee68a52624209f6193081

  • SHA512

    798f5419ad5d4fcf3e26d0d47d6dbf126d47dc72e8d65d38bcb7e4de0a3ab425a7b12b0a20f1b53241fed7e1d0cb470cfcc570056e6c709308b7d2839ca0f1a0

  • SSDEEP

    49152:gr3EMXDwDf60xhID/td/LOe8lJ9nTV7Or7L4uIt+ojQfi:g7EqUDy0xhID1db2nYHUuIjQa

Malware Config

Targets

    • Target

      luoma2.msi

    • Size

      2.0MB

    • MD5

      44933b8bcf9994f8d5088dbfd75bd781

    • SHA1

      4daeed4b62ec79ce1416ad7f62107db4525aeedc

    • SHA256

      2f77174a331482149dbb2a31cc57aebac7b7466ddbb309e40003c45bfad2e9da

    • SHA512

      e4c7297b7054960652090d5efabf9407a359ee547bea64ba9d6ddef325278c9f930be004ea1eccb11bf3aa10f3a4a61c1abf629f4a07c668864eb1acedec2aec

    • SSDEEP

      49152:JxB+M1DwJ9AQNvKbJ917NIe87J3ZbBjqrDvytoqjaxP:J7+EUJeQNvKb/75oZU/vyjad

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks