Resubmissions

02-08-2024 10:21

240802-mdxk7svekq 10

General

  • Target

    Sloro.exe

  • Size

    77.6MB

  • Sample

    240802-mdxk7svekq

  • MD5

    73c37ce469f89bc39bd87945d293cead

  • SHA1

    9334fbcdc24b41d918c812fac1c34def9e5aafd6

  • SHA256

    8e90b5cc12b5336f1aec86520c5866704e52cbeabcfdcc752b9fe259605c2772

  • SHA512

    c7d48d14fe34f1933d5ed8f60e1f6110735eb746d17bb1d5787fe25ccbad07d432cb5941e7e31f176bd4af358399a9bed0bf1a6be098d29f46971d3069ff5fac

  • SSDEEP

    1572864:DvHcRlqph7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4YiomE27CXqK:DvHcRIhTSkB05awqfhdCpukdRsu7Ca

Malware Config

Targets

    • Target

      Sloro.exe

    • Size

      77.6MB

    • MD5

      73c37ce469f89bc39bd87945d293cead

    • SHA1

      9334fbcdc24b41d918c812fac1c34def9e5aafd6

    • SHA256

      8e90b5cc12b5336f1aec86520c5866704e52cbeabcfdcc752b9fe259605c2772

    • SHA512

      c7d48d14fe34f1933d5ed8f60e1f6110735eb746d17bb1d5787fe25ccbad07d432cb5941e7e31f176bd4af358399a9bed0bf1a6be098d29f46971d3069ff5fac

    • SSDEEP

      1572864:DvHcRlqph7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4YiomE27CXqK:DvHcRIhTSkB05awqfhdCpukdRsu7Ca

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks