General

  • Target

    test.exe

  • Size

    24.2MB

  • Sample

    240619-st24hssflc

  • MD5

    0919a586daf614c482099b03d6e7582c

  • SHA1

    aa0e27d3f46b5b2b127afc893fac730d85228a61

  • SHA256

    040ae92d9079b9ac82f370cd8ad27bd49b5d3d5100b3182facbfda824531ee55

  • SHA512

    4f7b24f9310758d4f80b16fef4ac17faafd6f3602ccbed75345e5592774edd588c3b8035439825fbda708f6bb1163c5404bc95fde7822ae65e120043f63226ca

  • SSDEEP

    786432:yXZZKMr4dbEOOKMsAXB48vdW8m9x5cCD95kg+:yJZjr4dIDjxO0WVOCpKg

Malware Config

Targets

    • Target

      test.exe

    • Size

      24.2MB

    • MD5

      0919a586daf614c482099b03d6e7582c

    • SHA1

      aa0e27d3f46b5b2b127afc893fac730d85228a61

    • SHA256

      040ae92d9079b9ac82f370cd8ad27bd49b5d3d5100b3182facbfda824531ee55

    • SHA512

      4f7b24f9310758d4f80b16fef4ac17faafd6f3602ccbed75345e5592774edd588c3b8035439825fbda708f6bb1163c5404bc95fde7822ae65e120043f63226ca

    • SSDEEP

      786432:yXZZKMr4dbEOOKMsAXB48vdW8m9x5cCD95kg+:yJZjr4dIDjxO0WVOCpKg

    Score
    9/10
    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks