General
-
Target
ServerCrasher.exe
-
Size
78.6MB
-
Sample
240124-x4rgzsgdgr
-
MD5
4b59ef558144ac37e90c90202baa2630
-
SHA1
390bc03debe2d14dffa0f3820452df3b74d72f08
-
SHA256
ba3abb8bfea8e19b1a1bd17ac0800250c04e4783b2a7f7c55c53a74e701a276c
-
SHA512
8f608f7d5e22128a8f571e36fcc1992f46531778ec3cbe498409ebebd28d9a12888f3d69713b331d28b2c3dbce4dd818b13cfe800dbe68de28ed36f8259482ce
-
SSDEEP
1572864:WvlQ3j0DISk8IpG7V+VPhqcLE7YhjC0WlsnghowmaOllpWL9OMyWBqX:Wvl+tSkB05awcvhujsghfxOllpW9OvWo
Behavioral task
behavioral1
Sample
ServerCrasher.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
ServerCrasher.exe
-
Size
78.6MB
-
MD5
4b59ef558144ac37e90c90202baa2630
-
SHA1
390bc03debe2d14dffa0f3820452df3b74d72f08
-
SHA256
ba3abb8bfea8e19b1a1bd17ac0800250c04e4783b2a7f7c55c53a74e701a276c
-
SHA512
8f608f7d5e22128a8f571e36fcc1992f46531778ec3cbe498409ebebd28d9a12888f3d69713b331d28b2c3dbce4dd818b13cfe800dbe68de28ed36f8259482ce
-
SSDEEP
1572864:WvlQ3j0DISk8IpG7V+VPhqcLE7YhjC0WlsnghowmaOllpWL9OMyWBqX:Wvl+tSkB05awcvhujsghfxOllpW9OvWo
Score9/10-
Enumerates VirtualBox DLL files
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1