General

  • Target

    7Qzlzh

  • Size

    514B

  • Sample

    240802-1z2zpssdmp

  • MD5

    2f9db8d5cc974336ee3113df7721b975

  • SHA1

    ead61799b21169e8dae50bf9ac85e4af91096874

  • SHA256

    83479d278ad9107fc5d24441e9bc7870a5f896a49633d1ce1cef6f2fe283a110

  • SHA512

    1b0d550a7cd0c99fa7f38bd6e086293b3753b3f4a1ccaee8a0d8168bc7fd39d025783b274f4a3051a70399c07d4143771d1b1705bd818810a743657e165125ca

Malware Config

Targets

    • Target

      7Qzlzh

    • Size

      514B

    • MD5

      2f9db8d5cc974336ee3113df7721b975

    • SHA1

      ead61799b21169e8dae50bf9ac85e4af91096874

    • SHA256

      83479d278ad9107fc5d24441e9bc7870a5f896a49633d1ce1cef6f2fe283a110

    • SHA512

      1b0d550a7cd0c99fa7f38bd6e086293b3753b3f4a1ccaee8a0d8168bc7fd39d025783b274f4a3051a70399c07d4143771d1b1705bd818810a743657e165125ca

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks