General

  • Target

    source_prepared.exe

  • Size

    76.8MB

  • Sample

    240810-x9g6haydnh

  • MD5

    36d9528899f149e57aacd84d4e88f298

  • SHA1

    7e7447ca44d79b05857a6fc1f51db199dd611472

  • SHA256

    e73e951fff40de320b0ab31eed8251358ce571fae8842a6999d33f8087a8c8cb

  • SHA512

    83597491cdb8c971ccfe241902945f4cfca93c405cec155e284045d641076426108a0732fa7eb8b3ecbca839b8072923ddb581dea5ba9e63f0af4e89bf3295d1

  • SSDEEP

    1572864:ivHcRlaWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+hkrafEGV37U:ivHcRQJhTSkB05awcfLdMpuyhkrAto

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      76.8MB

    • MD5

      36d9528899f149e57aacd84d4e88f298

    • SHA1

      7e7447ca44d79b05857a6fc1f51db199dd611472

    • SHA256

      e73e951fff40de320b0ab31eed8251358ce571fae8842a6999d33f8087a8c8cb

    • SHA512

      83597491cdb8c971ccfe241902945f4cfca93c405cec155e284045d641076426108a0732fa7eb8b3ecbca839b8072923ddb581dea5ba9e63f0af4e89bf3295d1

    • SSDEEP

      1572864:ivHcRlaWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+hkrafEGV37U:ivHcRQJhTSkB05awcfLdMpuyhkrAto

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks