Resubmissions

14/07/2024, 18:33

240714-w7aszasdmp 10

14/07/2024, 18:26

240714-w3pfkavcnd 10

14/07/2024, 18:25

240714-w2ymvavclc 10

10/07/2024, 03:33

240710-d38v4awdpa 10

General

  • Target

    incognito exploit.rar

  • Size

    74.4MB

  • Sample

    240714-w7aszasdmp

  • MD5

    baa42d664e78eedfb73fa51123ec88d6

  • SHA1

    cf4f5e6ecfd656c9ca3affa4a0160e5fac0fdf62

  • SHA256

    b093dc0dff3008386c1a69823320d1eff8ab95a8a0bf2426236d6193349e0a2e

  • SHA512

    09ac212ee8f9d100f616b568047c665118eba9cc772320bb0e54e8d2023a0f091398653af27c5a109441588b3cd3730fe6c31c15bb8b37bf088011286a73c455

  • SSDEEP

    1572864:8m+K6ud7ag0ntd/82JX/UoAMDNdVneZRIeKm9snLA83DdoIpC00/r:8Tudeg0tfJvtsZ+w6Vdpwz

Malware Config

Targets

    • Target

      incognito.exe

    • Size

      76.5MB

    • MD5

      150318c4d5f0b500ae67e335104b7064

    • SHA1

      d2addea77f3041b0dcea36f0527d2f8470375b98

    • SHA256

      6dfb5fcf0cf99c3bdbd5214d27bec50582d4f77cb082f68971a5122098048a83

    • SHA512

      1ed1367abfe81c36d54a57aa85a22149aafb55f6e764a2abad2f91a2115e6646078530619561f470da470a12d0dbf0ec6095575c71b6b9220aee23a687e6cfeb

    • SSDEEP

      1572864:CvHcRl9WSk8IpG7V+VPhqb+TTE73lHt7fETiYweyJulZUdg1I6MWhABcmDtak:CvHcRySkB05awb+TMdeMpuJvMgetak

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks