General

  • Target

    source_prepared.exe

  • Size

    80.8MB

  • Sample

    240804-q2xgws1bre

  • MD5

    6906d95550a49dda012d04cdfb157f3a

  • SHA1

    8dbfcbb13b89b3f7bc153ca731538b67cebf9ee3

  • SHA256

    23d79c1abf45f21670f51ea8110e455f203dfc0d542933f613ac826230543618

  • SHA512

    d5baa604bfaa63f293c9063549e1188570810759704fd9b3c67a9571b895aa5a6d1573daa2ee486a2c2ec2bdeff255aef53ca893f254670ebdf1e644b927f944

  • SSDEEP

    1572864:MvxZQgli7vaSk8IpG7V+VPhqQdSiE70lg3iYgj+h58sMwAWw5DxNwJk:MvxZxYeSkB05awkSgeJ50Jp3

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      80.8MB

    • MD5

      6906d95550a49dda012d04cdfb157f3a

    • SHA1

      8dbfcbb13b89b3f7bc153ca731538b67cebf9ee3

    • SHA256

      23d79c1abf45f21670f51ea8110e455f203dfc0d542933f613ac826230543618

    • SHA512

      d5baa604bfaa63f293c9063549e1188570810759704fd9b3c67a9571b895aa5a6d1573daa2ee486a2c2ec2bdeff255aef53ca893f254670ebdf1e644b927f944

    • SSDEEP

      1572864:MvxZQgli7vaSk8IpG7V+VPhqQdSiE70lg3iYgj+h58sMwAWw5DxNwJk:MvxZxYeSkB05awkSgeJ50Jp3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks