General

  • Target

    AutoBeamerV1.1.rar

  • Size

    73.3MB

  • Sample

    240819-m2k73stdjl

  • MD5

    9429ec77c1a94932261d618840d6875e

  • SHA1

    966749512c1c75389191be47ba5993d6154e8985

  • SHA256

    dba97e95d6b9c7c9bdc097d22d3230dae57b429e8823d5b4df140e9fbb78995c

  • SHA512

    49f325bbde71117f71bfc3a0242058abe45197754126c54cd98b9715bcbb0b76dd7cefe8cc5c3c487c17644038a04f4e8fae70a90ad4c2f904358fc4f5d12e3a

  • SSDEEP

    1572864:Ujls2avFamHZAMSEoEhwT23vhYoeeoqRY/riUkaCipgeI/KXK:dBIm59tBhwWpYoPoKY/r2aHgxt

Malware Config

Targets

    • Target

      AutoBeamer V1.1.exe

    • Size

      76.3MB

    • MD5

      bbfa9b45088705800ce901e3043d051b

    • SHA1

      4b76ab4c598310c5dd0e9e6a33c69fc86522bfd8

    • SHA256

      c4de28267a0f3547e28d72b75d077b0143f56cffbc657a1d122ec069df47e049

    • SHA512

      c7c35bd1a13c6e690c587544c4e884a2de6c3d50196ee07a9c392b211580683d314938a4fd7ee2ab34895b699a2699a9b053276d47d75230c9facf0f37009b27

    • SSDEEP

      1572864:fvhQ6lNWeq7vDSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDa+YZ48uT:fvh1f1qPSkB05awIxTy5nMHVLtetLuT

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks