General

  • Target

    Launcher v6.0 (1).rar

  • Size

    74.1MB

  • Sample

    240812-xqmlwavejj

  • MD5

    de820cc543d43815f3a780dbad13c131

  • SHA1

    bc3be096d2ef2cfa87720021c6e835f54eafad69

  • SHA256

    49dac663fbf5bef28eed78403ed0c356dac845d29af7c96b34c5d32f9e8d9a63

  • SHA512

    e419c527e547f017528060f099c94337afcb848ade6094727bc3cd7e261a074c6ac68eac3700318485ad91929bdb6acd592ece3b54ea5076df2b61f721217460

  • SSDEEP

    1572864:TnOt4L2MNaK1OaMKYqOUWaMNJ6kB5ejiGQEm00Uz4H/jCjWPsD:qt3PlaXYMkvUJmQ4HLt2

Malware Config

Targets

    • Target

      Launcher.exe

    • Size

      77.6MB

    • MD5

      b7c77822d07af8223b061f49df46cf5a

    • SHA1

      1ed87417f258867fe1001cf2605e2b2f3e1c03c6

    • SHA256

      2abccde5a537cfbba983257ace4238e009a4dea56b5aadb0bfe843916916c8d2

    • SHA512

      ba82da6801dd0b794d54484f6bac54c266035d1cfb425f4501af51124567db89986c458078557a96b6af16e6e0fe464a27ccd1845a3d12919ceee6ad72355f75

    • SSDEEP

      1572864:DxvHcRlPKh7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4mVuxa/Z9UR:DxvHcRAhTSkB05awqfhdCpukdRPs9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks