General

  • Target

    544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe.vir

  • Size

    26.1MB

  • Sample

    241128-hg6k3aypdt

  • MD5

    221efb4a5fa8ac017bf3918669495e83

  • SHA1

    682b7b9d1a0868625b3c358c73fa99024fbb114f

  • SHA256

    544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026

  • SHA512

    2ce0707c3535277652720dc866c6b7476969c887b6faa8acb555af8966460bb39ebed0c5fa8c672e41c37a850186847e7da2ac42ea16ca2dca97f903b736a87b

  • SSDEEP

    393216:H/4u+DepixkkahO/Ria/mMZGhK13BLwk2YFr287+jX9Zmgr7nPvkA61EXwc7yhNO:f4u+SPfk/1kG19FNkygnPvks7yhAxtNh

Malware Config

Targets

    • Target

      544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026.exe.vir

    • Size

      26.1MB

    • MD5

      221efb4a5fa8ac017bf3918669495e83

    • SHA1

      682b7b9d1a0868625b3c358c73fa99024fbb114f

    • SHA256

      544ce0a2f004e8a12f5004496aedc83b2f863a5e8228c8529df9956f7df2b026

    • SHA512

      2ce0707c3535277652720dc866c6b7476969c887b6faa8acb555af8966460bb39ebed0c5fa8c672e41c37a850186847e7da2ac42ea16ca2dca97f903b736a87b

    • SSDEEP

      393216:H/4u+DepixkkahO/Ria/mMZGhK13BLwk2YFr287+jX9Zmgr7nPvkA61EXwc7yhNO:f4u+SPfk/1kG19FNkygnPvks7yhAxtNh

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks