General

  • Target

    Pysil.zip

  • Size

    76.7MB

  • Sample

    240819-mk3qsssdqk

  • MD5

    a200b39d9bf4974d4eccd3d8920d55b5

  • SHA1

    47ce404e814c46f2b829809156db742248395846

  • SHA256

    174436f54900cc5e0791f47bd70444dcf46ae9cec1d55a04776ddfe37ff9e3d4

  • SHA512

    1964bb4bfb800920b968283e9bd79bdabc3ab00a5c98cf7151d980190d0d06b930c5c19e4e0e2f5a943c9a7878425ff38e5442a8fa5bb772458a15e50b483af1

  • SSDEEP

    1572864:ZBsk+78FPdD3DiW0clSjH4Hj9EDwfs5CtW8Wttsaseux/rwiTPHrtcrm3fviyP:ZBs3gFPd/iW1UbQiEkl8WjZuxFHrOyHX

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      77.1MB

    • MD5

      c630bfc590d34139bce713a9f588173d

    • SHA1

      6c63c331bd54db755a1a1342b2b89b1ffde6f3a8

    • SHA256

      5d7b8fccb2dd56566c6b72ff868264c605eee3175ac30eb0214146db1ced86eb

    • SHA512

      a2819599c97b349912a7a0b1b6f3c0c047598c16980ca31cef487c10bbae591108b291769b7ce4ddf88b328863f5319be40de6d0750f76808a802e6f529836df

    • SSDEEP

      1572864:BvhQ6lNWeoC7vDSk8IpG7V+VPhqqg5NbE7W8ylPj4iY4MHHLeqPNLtDaoRZrvGH:Bvh1f1oCPSkB05awBzx8y5nMHVLteQ9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks