General

  • Target

    SecuriteInfo.com.Python.Stealer.1210.4443.27895.exe

  • Size

    74.6MB

  • Sample

    240512-tryhzsgh67

  • MD5

    1720dd7849e2a871be2e9bcefd0bdcf6

  • SHA1

    11d353b4ecb69cafcac17c08dccc0a021c04d881

  • SHA256

    bb20b91f7c27e5d926e4a2d256096d86c8382cdb52553a6191217f3cac5e7ed1

  • SHA512

    8c47840afe7fe037b2f547dd206112c9e6482c6a34fb7a08984234ba697afb7316047414cc0d836e1ab8463b55fe4fe4d538af7fa6e793d6e90a5ff4dd5700d2

  • SSDEEP

    1572864:0vFUQpj3nwSk8IpG7V+VPhqeAE7WZ7jRUiY4MHHLeqPNLtDYWMlZoHN:0vFUqUSkB05aweEZ7dvMHVLt85lw

Malware Config

Targets

    • Target

      SecuriteInfo.com.Python.Stealer.1210.4443.27895.exe

    • Size

      74.6MB

    • MD5

      1720dd7849e2a871be2e9bcefd0bdcf6

    • SHA1

      11d353b4ecb69cafcac17c08dccc0a021c04d881

    • SHA256

      bb20b91f7c27e5d926e4a2d256096d86c8382cdb52553a6191217f3cac5e7ed1

    • SHA512

      8c47840afe7fe037b2f547dd206112c9e6482c6a34fb7a08984234ba697afb7316047414cc0d836e1ab8463b55fe4fe4d538af7fa6e793d6e90a5ff4dd5700d2

    • SSDEEP

      1572864:0vFUQpj3nwSk8IpG7V+VPhqeAE7WZ7jRUiY4MHHLeqPNLtDYWMlZoHN:0vFUqUSkB05aweEZ7dvMHVLt85lw

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks