General
-
Target
incognito exploit.rar
-
Size
74.4MB
-
Sample
240714-w7aszasdmp
-
MD5
baa42d664e78eedfb73fa51123ec88d6
-
SHA1
cf4f5e6ecfd656c9ca3affa4a0160e5fac0fdf62
-
SHA256
b093dc0dff3008386c1a69823320d1eff8ab95a8a0bf2426236d6193349e0a2e
-
SHA512
09ac212ee8f9d100f616b568047c665118eba9cc772320bb0e54e8d2023a0f091398653af27c5a109441588b3cd3730fe6c31c15bb8b37bf088011286a73c455
-
SSDEEP
1572864:8m+K6ud7ag0ntd/82JX/UoAMDNdVneZRIeKm9snLA83DdoIpC00/r:8Tudeg0tfJvtsZ+w6Vdpwz
Behavioral task
behavioral1
Sample
incognito.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
incognito.exe
-
Size
76.5MB
-
MD5
150318c4d5f0b500ae67e335104b7064
-
SHA1
d2addea77f3041b0dcea36f0527d2f8470375b98
-
SHA256
6dfb5fcf0cf99c3bdbd5214d27bec50582d4f77cb082f68971a5122098048a83
-
SHA512
1ed1367abfe81c36d54a57aa85a22149aafb55f6e764a2abad2f91a2115e6646078530619561f470da470a12d0dbf0ec6095575c71b6b9220aee23a687e6cfeb
-
SSDEEP
1572864:CvHcRl9WSk8IpG7V+VPhqb+TTE73lHt7fETiYweyJulZUdg1I6MWhABcmDtak:CvHcRySkB05awb+TMdeMpuJvMgetak
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1