General

  • Target

    source_prepared.exe

  • Size

    76.8MB

  • Sample

    240815-29zg1a1cnh

  • MD5

    337a7003e4ff3888e03a52c95c47db79

  • SHA1

    995b32de7088c2b90d6a02d94400a18f48c983de

  • SHA256

    71cea635caa9af55f6d9d1486031e6e2b87cd0e9760d65ac6e84e08890cff543

  • SHA512

    e3e92689ef414751e4ad57f225c15409e0b90ec29af428d3431a1610db982fc62a33d0de47aa0175cc3cf37c0340e705f55a6d19539e76b3918ad79d2379f999

  • SSDEEP

    1572864:EvHcRlTWzh7vXSk8IpG7V+VPhqYdfME7ZlH/iYweyJulZUdgNr9svqZ9Ui:EvHcRlUhTSkB05awcfvdQpuRrb9U

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      76.8MB

    • MD5

      337a7003e4ff3888e03a52c95c47db79

    • SHA1

      995b32de7088c2b90d6a02d94400a18f48c983de

    • SHA256

      71cea635caa9af55f6d9d1486031e6e2b87cd0e9760d65ac6e84e08890cff543

    • SHA512

      e3e92689ef414751e4ad57f225c15409e0b90ec29af428d3431a1610db982fc62a33d0de47aa0175cc3cf37c0340e705f55a6d19539e76b3918ad79d2379f999

    • SSDEEP

      1572864:EvHcRlTWzh7vXSk8IpG7V+VPhqYdfME7ZlH/iYweyJulZUdgNr9svqZ9Ui:EvHcRlUhTSkB05awcfvdQpuRrb9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks