General

  • Target

    source_prepared.exe

  • Size

    103.0MB

  • Sample

    240818-sc6qdaygjd

  • MD5

    ce4a29ffe42cfa030dd86f2790717ed8

  • SHA1

    1974f3d45130e0d8055a6b2f85778feebb401804

  • SHA256

    c6bf772cfa85f5f83e051aab11bafe17e3bbd16372e9f8b77c71298652cccd1f

  • SHA512

    fbf4cbf79d9a441454c012dd8592ae57e15a5a13c4f9d8c18f8908d36fd7ca8b8a5068d91bf91f477cd584d868ca2a8e8a8a8115df46eaf905465a8c8910158d

  • SSDEEP

    3145728:WbCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB9aLr5Wo:WBgSWNa6sHCip1XcB9aL

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      103.0MB

    • MD5

      ce4a29ffe42cfa030dd86f2790717ed8

    • SHA1

      1974f3d45130e0d8055a6b2f85778feebb401804

    • SHA256

      c6bf772cfa85f5f83e051aab11bafe17e3bbd16372e9f8b77c71298652cccd1f

    • SHA512

      fbf4cbf79d9a441454c012dd8592ae57e15a5a13c4f9d8c18f8908d36fd7ca8b8a5068d91bf91f477cd584d868ca2a8e8a8a8115df46eaf905465a8c8910158d

    • SSDEEP

      3145728:WbCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB9aLr5Wo:WBgSWNa6sHCip1XcB9aL

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks