General

  • Target

    Launcher_v0.876 beta.rar

  • Size

    72.4MB

  • Sample

    240820-1gfczsybrm

  • MD5

    84a8031209e7eb636100ba07ed20ceb1

  • SHA1

    39564810853ffdeaeaff94963af54ca3d1c60eeb

  • SHA256

    28f86d1485d28aead2165497ffe749b56d433007a8fe4e80916408b05bfc66f6

  • SHA512

    730eee747d88dcd0537a488e0a54523d1278c677bcaf716c5d0a8e5ff5eeecc0fbd46b76994cbc5c26b9adfc2dc0e259fe938db2937e59eddb16daee54bc737d

  • SSDEEP

    1572864:465CQEoMF0GqE4aiCBp0sHNV017x1Lw7u9nh3eujUrD6lfKBvODeM291:4m6D/HBKsj01xXs338DeM291

Malware Config

Targets

    • Target

      Launcher_v0.876 beta.exe

    • Size

      75.4MB

    • MD5

      be2a85fc60c15682bd64055f1222c59e

    • SHA1

      0223e9103c63b9a7ea84121871f7fd823905f95e

    • SHA256

      6ac60acecec3832cbcdf8c593489e394619a433da7806ad0f29aa6e618078c2f

    • SHA512

      358ce8869f4d334501cf35d2f4451c335d7976ec615503c1e0cc117054e1cbba0db42e7e55ae909fa62ba89e13856dddf1d262c275979c0da9009337a2bdb282

    • SSDEEP

      1572864:wvhQ6l777vDSk8IpG7V+VPhqWK8pE7WTDlPNiY4MHHLeqPNLtDSHWzZp1+K:wvh1JPSkB05awWK8TTD5CMHVLtOa9r

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks