General

  • Target

    VirtualBox-7.0.10-158379-Win.exe

  • Size

    105.8MB

  • Sample

    230901-g2z4cach6s

  • MD5

    8882a55227cccc8a3f7ab69641df19fd

  • SHA1

    5ea28f4fb204e6c50d1306f2e135eb40c8f1fe83

  • SHA256

    62545b8eb17ddf27d5954ac5f8904814e12c5790d73daf545ef60bd97f4f2e12

  • SHA512

    d57a47ebc4ab383efa35b1505426c11207c1ed0d1ad9bd826ec252a6f6aa2bfe0debc379869fbb3cc8cafce17badcfd855d2b85e72d7485643a286ac81278c0c

  • SSDEEP

    3145728:Km59GTfa+aEDsv1Wt+y16flApINSNICSzlKL:L9G4EDsIzoflJNnI

Score
8/10

Malware Config

Targets

    • Target

      VirtualBox-7.0.10-158379-Win.exe

    • Size

      105.8MB

    • MD5

      8882a55227cccc8a3f7ab69641df19fd

    • SHA1

      5ea28f4fb204e6c50d1306f2e135eb40c8f1fe83

    • SHA256

      62545b8eb17ddf27d5954ac5f8904814e12c5790d73daf545ef60bd97f4f2e12

    • SHA512

      d57a47ebc4ab383efa35b1505426c11207c1ed0d1ad9bd826ec252a6f6aa2bfe0debc379869fbb3cc8cafce17badcfd855d2b85e72d7485643a286ac81278c0c

    • SSDEEP

      3145728:Km59GTfa+aEDsv1Wt+y16flApINSNICSzlKL:L9G4EDsIzoflJNnI

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks