General

  • Target

    fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804.msi.vir

  • Size

    135.7MB

  • Sample

    241128-g5w6vsylet

  • MD5

    f251241df91698f6d87500b7ba697399

  • SHA1

    0eeb66750d3cbded68ddd579d7c06b657158c829

  • SHA256

    fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804

  • SHA512

    3e3eb70d63b68a58c337ec8a94d340e2174806d69873c344fa9b68bba7a82f1c0f5c9bdafc036ddf141980ca4240eecd95592b463ee5e54f52d0af969bdd958e

  • SSDEEP

    3145728:eUlSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLUR6qxr7W3G9Ay:plSw/7ksOneWVm/CDYddLYHtKg

Malware Config

Targets

    • Target

      fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804.msi.vir

    • Size

      135.7MB

    • MD5

      f251241df91698f6d87500b7ba697399

    • SHA1

      0eeb66750d3cbded68ddd579d7c06b657158c829

    • SHA256

      fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804

    • SHA512

      3e3eb70d63b68a58c337ec8a94d340e2174806d69873c344fa9b68bba7a82f1c0f5c9bdafc036ddf141980ca4240eecd95592b463ee5e54f52d0af969bdd958e

    • SSDEEP

      3145728:eUlSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLUR6qxr7W3G9Ay:plSw/7ksOneWVm/CDYddLYHtKg

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks