General

  • Target

    shadowv2.exe

  • Size

    78.5MB

  • Sample

    240824-xww3hawgjn

  • MD5

    d5903392967c322ea430de7d8b7ee1bb

  • SHA1

    269eab53b42ad6c46f2502db6c2154aa7adbbb68

  • SHA256

    b451e161e2d6f6545d33dfded14b0f8eb31b71ff5a37a441cbc1c7244cc9d621

  • SHA512

    49844d2d51bb038b1188cb79e370d70d859c5c392f6d25ca760a564056f846ef18e12d467385c5894d14bc3502db2ad01884aba57e39f35d1bcc52ea3a550a84

  • SSDEEP

    1572864:avHcRlqxh7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4NSyuxa/Z9UR:avHcREhTSkB05awqfhdCpukdRMs9U

Malware Config

Targets

    • Target

      shadowv2.exe

    • Size

      78.5MB

    • MD5

      d5903392967c322ea430de7d8b7ee1bb

    • SHA1

      269eab53b42ad6c46f2502db6c2154aa7adbbb68

    • SHA256

      b451e161e2d6f6545d33dfded14b0f8eb31b71ff5a37a441cbc1c7244cc9d621

    • SHA512

      49844d2d51bb038b1188cb79e370d70d859c5c392f6d25ca760a564056f846ef18e12d467385c5894d14bc3502db2ad01884aba57e39f35d1bcc52ea3a550a84

    • SSDEEP

      1572864:avHcRlqxh7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4NSyuxa/Z9UR:avHcREhTSkB05awqfhdCpukdRMs9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks