General

  • Target

    ggggugeliulanqGoogle1217.msi.vir

  • Size

    54.3MB

  • Sample

    241221-nng4yaypgr

  • MD5

    afbf73c1469b3641f62cccb2b0bb178a

  • SHA1

    633fd0c782856aba35f718c6806a8693fc2a5689

  • SHA256

    e308b5f5029ee8f51f866beee18370456632409cd34a77e7992ae82ab282cdb6

  • SHA512

    b92be4412e560f3103252a98371c9e0b1a5fde0aaa1016a146988dd0a34acd7d8f43aefcfdd6dd4d53c6058ff5a2b649ae35402996a3b4db2557b010923eaa6b

  • SSDEEP

    786432:kErzXzCnli5q0Nl+nIgX9mt9Pfn8qjeoiMyIDbbLJsaC+lLft7NmkudZ0/4YTx6V:RrvCnMjkmjfn8qjem6Rat7b4kl/F0

Malware Config

Targets

    • Target

      ggggugeliulanqGoogle1217.msi.vir

    • Size

      54.3MB

    • MD5

      afbf73c1469b3641f62cccb2b0bb178a

    • SHA1

      633fd0c782856aba35f718c6806a8693fc2a5689

    • SHA256

      e308b5f5029ee8f51f866beee18370456632409cd34a77e7992ae82ab282cdb6

    • SHA512

      b92be4412e560f3103252a98371c9e0b1a5fde0aaa1016a146988dd0a34acd7d8f43aefcfdd6dd4d53c6058ff5a2b649ae35402996a3b4db2557b010923eaa6b

    • SSDEEP

      786432:kErzXzCnli5q0Nl+nIgX9mt9Pfn8qjeoiMyIDbbLJsaC+lLft7NmkudZ0/4YTx6V:RrvCnMjkmjfn8qjem6Rat7b4kl/F0

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks