General

  • Target

    43aae14f4b30b5430cc6721b0d27951ea7aee5d9127ae69ab84765ae4b0d3849

  • Size

    77.7MB

  • Sample

    240809-q2y1qaverb

  • MD5

    f9362e92e215237c17b2dd1f6580d7bd

  • SHA1

    8ef7d2dc7776653aa08acc8f1e5f943ba5ef6012

  • SHA256

    43aae14f4b30b5430cc6721b0d27951ea7aee5d9127ae69ab84765ae4b0d3849

  • SHA512

    3649572661aafcb377484ca8b7a57018ce79c4c15a03b51c2d81940a468c911adb03493ffc84333cf5f5b7e3da391476f3734791302da4a73c730b1933af80b9

  • SSDEEP

    1572864:svHcRlP9Ih7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4Esuxa/Z9UR:svHcRchTSkB05awqfhdCpukdRIs9U

Malware Config

Targets

    • Target

      43aae14f4b30b5430cc6721b0d27951ea7aee5d9127ae69ab84765ae4b0d3849

    • Size

      77.7MB

    • MD5

      f9362e92e215237c17b2dd1f6580d7bd

    • SHA1

      8ef7d2dc7776653aa08acc8f1e5f943ba5ef6012

    • SHA256

      43aae14f4b30b5430cc6721b0d27951ea7aee5d9127ae69ab84765ae4b0d3849

    • SHA512

      3649572661aafcb377484ca8b7a57018ce79c4c15a03b51c2d81940a468c911adb03493ffc84333cf5f5b7e3da391476f3734791302da4a73c730b1933af80b9

    • SSDEEP

      1572864:svHcRlP9Ih7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4Esuxa/Z9UR:svHcRchTSkB05awqfhdCpukdRIs9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks