Resubmissions

25/08/2024, 21:53

240825-1rsq3ayflk 10

25/08/2024, 21:50

240825-1pwd6syejm 10

General

  • Target

    Epic-Games.exe

  • Size

    76.8MB

  • Sample

    240825-1pwd6syejm

  • MD5

    7c96ab64d69466c48ba5c5f6a625aabd

  • SHA1

    1c54af7d2576573f82697bbaaddc99ba8cfffe33

  • SHA256

    ff86e494678fd3fefee391aa2d94e53cb3ef1c80ef6181d1007f33fe13ba7927

  • SHA512

    7754ced4d2e2a2ac37a71f1dedf355a4a46d49b1e46da21afbfde3461f7b3d348031ca3bf36f973fdd3133b8318e22c0e2948006a73dd08652fdacef2f19e824

  • SSDEEP

    1572864:yvHcRlKW/h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghh+reqEjV37U:yvHcRYYhTSkB05awcfLdMpuFh+rbQo

Malware Config

Targets

    • Target

      Epic-Games.exe

    • Size

      76.8MB

    • MD5

      7c96ab64d69466c48ba5c5f6a625aabd

    • SHA1

      1c54af7d2576573f82697bbaaddc99ba8cfffe33

    • SHA256

      ff86e494678fd3fefee391aa2d94e53cb3ef1c80ef6181d1007f33fe13ba7927

    • SHA512

      7754ced4d2e2a2ac37a71f1dedf355a4a46d49b1e46da21afbfde3461f7b3d348031ca3bf36f973fdd3133b8318e22c0e2948006a73dd08652fdacef2f19e824

    • SSDEEP

      1572864:yvHcRlKW/h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghh+reqEjV37U:yvHcRYYhTSkB05awcfLdMpuFh+rbQo

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks