General

  • Target

    332c821af961b47398a1e02396dbf624ecebaba2fc6e92c167d34c45d226eae2.msi.vir

  • Size

    135.7MB

  • Sample

    241130-qvdffavpat

  • MD5

    ccf528349a15583c45b5a3adfebbcf82

  • SHA1

    5b3232e3267acf8b3ffb4998c526a10eadc695da

  • SHA256

    332c821af961b47398a1e02396dbf624ecebaba2fc6e92c167d34c45d226eae2

  • SHA512

    7e5bfa1bb4b35cbb840bdf77e7835c37b04f780d21f0f5c09d623a44c2685a21db33e946bbdf663922387b02acf0c5457bdd7329d6dff13a78c22c7cead6e8f5

  • SSDEEP

    3145728:CglSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLURLhMkzEgRo:BlSw/7ksOneWVm/CDYddLYdMSY

Malware Config

Targets

    • Target

      332c821af961b47398a1e02396dbf624ecebaba2fc6e92c167d34c45d226eae2.msi.vir

    • Size

      135.7MB

    • MD5

      ccf528349a15583c45b5a3adfebbcf82

    • SHA1

      5b3232e3267acf8b3ffb4998c526a10eadc695da

    • SHA256

      332c821af961b47398a1e02396dbf624ecebaba2fc6e92c167d34c45d226eae2

    • SHA512

      7e5bfa1bb4b35cbb840bdf77e7835c37b04f780d21f0f5c09d623a44c2685a21db33e946bbdf663922387b02acf0c5457bdd7329d6dff13a78c22c7cead6e8f5

    • SSDEEP

      3145728:CglSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLURLhMkzEgRo:BlSw/7ksOneWVm/CDYddLYdMSY

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks