General

  • Target

    Unite-Craft.rar

  • Size

    101.2MB

  • Sample

    240824-x3rflaxakp

  • MD5

    8f56822ee9daa7f199ea43c3d4918d61

  • SHA1

    62dda20ee1018961d8b0c7ae6693a5c59de6e688

  • SHA256

    cd86c806b46fd0e3a70fcac760c877065aa3622f11453043e8232a3c43e3ee35

  • SHA512

    01cede7b58cd463457d2ff2f0f4025fc8cf6f6639cbf994a2c9137747c3a4c6dc248ce471c447b373d9cf80ef2bc07bab43ba32045472bb1e550e078333b2165

  • SSDEEP

    1572864:ry937+o1WY7E1Z+P+tO7mqC0lJde+kwsoz0QljBJ1ZV1fBBnKvMYuev1PsqMXVOO:ArxsY7STY91l6wcQFL1jdBfivSPXoy

Malware Config

Targets

    • Target

      Unite-Craft/Macrophic-test1.exe

    • Size

      102.8MB

    • MD5

      ddde7665eb07ac06502d05afac46a4bf

    • SHA1

      ee8cb0adcc5443b4af510cd3d3928cc6bd0e2024

    • SHA256

      ba560a4dd6813c4c750e7c99e80285a9eb733a1f5eb184d463386862921c4d25

    • SHA512

      d28ce0c871e7227a59cf82efe28ea407662545e4923ba4a64a88d4dea8f4b7ec9c2f1f1d3ebb98bd386e21df33f09296d5b66e787a3c4aceaf33aec6c579f9a7

    • SSDEEP

      3145728:LoCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB8amrrWo:LSgSWNa6sHCip1XcB8am

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks