General

  • Target

    source_prepared.exe

  • Size

    107.7MB

  • Sample

    240710-dtg11svhmc

  • MD5

    8a1bc71aae4e3f93e465cb9b10f4b63f

  • SHA1

    72702a415aedb554754c85faf7af851200ba8a8b

  • SHA256

    08b7f2490b00ffcbbd5bb546270fb035dca92786731f1d625cc9af6eb7fcdda3

  • SHA512

    5365db02f9b2f4ae80afc12381d09d0a4a77f64439c511b4d36063a18ef4942ebbc0649b8bd842afb925aaf71cfe6dabf50270ff78e63b7370c5419166e8a450

  • SSDEEP

    3145728:TS7paiS6xjKcBa6R2qHO5izBVnG0iWMstB2Ox0/r3:OVjSWNa6HHCittieBm

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      107.7MB

    • MD5

      8a1bc71aae4e3f93e465cb9b10f4b63f

    • SHA1

      72702a415aedb554754c85faf7af851200ba8a8b

    • SHA256

      08b7f2490b00ffcbbd5bb546270fb035dca92786731f1d625cc9af6eb7fcdda3

    • SHA512

      5365db02f9b2f4ae80afc12381d09d0a4a77f64439c511b4d36063a18ef4942ebbc0649b8bd842afb925aaf71cfe6dabf50270ff78e63b7370c5419166e8a450

    • SSDEEP

      3145728:TS7paiS6xjKcBa6R2qHO5izBVnG0iWMstB2Ox0/r3:OVjSWNa6HHCittieBm

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks