General

  • Target

    PepperX.exe

  • Size

    76.8MB

  • Sample

    240819-bcwfzavfmf

  • MD5

    f1bc39b4e64cb51e38cc5b151567e6e2

  • SHA1

    49c9112f7ef8a0636f98f8749e99af62eab74f0d

  • SHA256

    0b3cf24c45d3e6b30b9b87c66a23d3f1fe40fea37dd7ed8116507e00bf21198f

  • SHA512

    19e8325be9532c3d5086bd783af59ebac877656866bb07fe28b6b289e2829030d0428447bedbdf43fae337e510691f85879951bf439fda882ca504ef043b3827

  • SSDEEP

    1572864:YvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h9rFfEpV37U:YvHcRYQhTSkB05awcfLdMpuyh9r5Wo

Malware Config

Targets

    • Target

      PepperX.exe

    • Size

      76.8MB

    • MD5

      f1bc39b4e64cb51e38cc5b151567e6e2

    • SHA1

      49c9112f7ef8a0636f98f8749e99af62eab74f0d

    • SHA256

      0b3cf24c45d3e6b30b9b87c66a23d3f1fe40fea37dd7ed8116507e00bf21198f

    • SHA512

      19e8325be9532c3d5086bd783af59ebac877656866bb07fe28b6b289e2829030d0428447bedbdf43fae337e510691f85879951bf439fda882ca504ef043b3827

    • SSDEEP

      1572864:YvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h9rFfEpV37U:YvHcRYQhTSkB05awcfLdMpuyh9r5Wo

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks