General

  • Target

    VirtualBox-7.0.14-161095-Win.exe

  • Size

    106.0MB

  • Sample

    240125-d3vngafffm

  • MD5

    cdf2059571281b67a232c4933d7632e2

  • SHA1

    5a7496a1adfb5dd3ce6b02ef51dffa0a5c0ea2c7

  • SHA256

    4719b38e7a276b43099ce4d6349e6bfc80edf644ee59d9dafd264bc7ed7691f4

  • SHA512

    bca6b7770162cf02dce019230097d107ff876c0ca6a32fd78e7a361f6a5a183698ad4d0bc026c59dff5eb43ac209434ca2e0adc3e9f6b4f9dab20fd3542c2d28

  • SSDEEP

    3145728:/GjAJr3F4hLioOZmlnZJK1pTMOZ68wsoI:/xr3uLiogmlZnwkI

Score
8/10

Malware Config

Targets

    • Target

      VirtualBox-7.0.14-161095-Win.exe

    • Size

      106.0MB

    • MD5

      cdf2059571281b67a232c4933d7632e2

    • SHA1

      5a7496a1adfb5dd3ce6b02ef51dffa0a5c0ea2c7

    • SHA256

      4719b38e7a276b43099ce4d6349e6bfc80edf644ee59d9dafd264bc7ed7691f4

    • SHA512

      bca6b7770162cf02dce019230097d107ff876c0ca6a32fd78e7a361f6a5a183698ad4d0bc026c59dff5eb43ac209434ca2e0adc3e9f6b4f9dab20fd3542c2d28

    • SSDEEP

      3145728:/GjAJr3F4hLioOZmlnZJK1pTMOZ68wsoI:/xr3uLiogmlZnwkI

    Score
    8/10
    • Drops file in Drivers directory

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks