General
-
Target
Tempest.exe
-
Size
75.9MB
-
Sample
240807-vjypfsvale
-
MD5
ebfaa1d9949c75252082ef900171cc88
-
SHA1
52335d715d19512ea5dd7cf3d0cf08275e8c71ec
-
SHA256
39c4ef7fdd4f1fe9e538ebe85d86cc5b21008226d6d61979bc251ceae80fd87a
-
SHA512
06b2b71c4d34e27d301fae208d12471a92f0689955630ca8371d0838505e654df7ac8d80b6fb045e5c4bd3b44c72b83c1617d43f1e63cf47b7fb567a0cf8afa0
-
SSDEEP
1572864:T2vHcRlqGSk8IpG7V+VPhqWdfWE7wFltFziYweyJulZUdgAdW4ppuBa/Z9UN/:ivHcRxSkB05awqfG3CpukdRG89U
Behavioral task
behavioral1
Sample
Tempest.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Tempest.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Tempest.exe
-
Size
75.9MB
-
MD5
ebfaa1d9949c75252082ef900171cc88
-
SHA1
52335d715d19512ea5dd7cf3d0cf08275e8c71ec
-
SHA256
39c4ef7fdd4f1fe9e538ebe85d86cc5b21008226d6d61979bc251ceae80fd87a
-
SHA512
06b2b71c4d34e27d301fae208d12471a92f0689955630ca8371d0838505e654df7ac8d80b6fb045e5c4bd3b44c72b83c1617d43f1e63cf47b7fb567a0cf8afa0
-
SSDEEP
1572864:T2vHcRlqGSk8IpG7V+VPhqWdfWE7wFltFziYweyJulZUdgAdW4ppuBa/Z9UN/:ivHcRxSkB05awqfG3CpukdRG89U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-