General

  • Target

    4706e8e33e9d243632542d06d4dd59c21e0e728e95ee4bee65834ac61d8c6696.exe.vir

  • Size

    26.1MB

  • Sample

    241126-fenlcs1rbk

  • MD5

    c11bd68f0ea2c26136f863cfb99df68d

  • SHA1

    f32112336c84626ba31258ea51d378ab9891801c

  • SHA256

    4706e8e33e9d243632542d06d4dd59c21e0e728e95ee4bee65834ac61d8c6696

  • SHA512

    b53646c08550cb5311831f5a5dee467b808ff0eaa5411422e1f1e0036d3c9495b9987ab7570898d0f17011168b762461f73e583d5f9c1d4b76eb7c6ecff2a6c5

  • SSDEEP

    393216:qR4u+DepixkkahO/Ria/mMZGhK13BLwk2YFr287+jX9Zmgr7nPvkA61EXwc7yhNx:e4u+SPfk/1kG19FNkygnPvks7yhAxtNa

Malware Config

Targets

    • Target

      4706e8e33e9d243632542d06d4dd59c21e0e728e95ee4bee65834ac61d8c6696.exe.vir

    • Size

      26.1MB

    • MD5

      c11bd68f0ea2c26136f863cfb99df68d

    • SHA1

      f32112336c84626ba31258ea51d378ab9891801c

    • SHA256

      4706e8e33e9d243632542d06d4dd59c21e0e728e95ee4bee65834ac61d8c6696

    • SHA512

      b53646c08550cb5311831f5a5dee467b808ff0eaa5411422e1f1e0036d3c9495b9987ab7570898d0f17011168b762461f73e583d5f9c1d4b76eb7c6ecff2a6c5

    • SSDEEP

      393216:qR4u+DepixkkahO/Ria/mMZGhK13BLwk2YFr287+jX9Zmgr7nPvkA61EXwc7yhNx:e4u+SPfk/1kG19FNkygnPvks7yhAxtNa

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks