General

  • Target

    OTP_PAID_BY_VREX.exe

  • Size

    106.8MB

  • Sample

    240825-yx8ncssepe

  • MD5

    e306660259c9cf4c91a776374ddd2413

  • SHA1

    5389b87cf600ab8aea6c5287923bb9f360bbc592

  • SHA256

    a8d70af3729a35a9ad8903be249b81e69f069a37113cade2bb0736e967a8c9f3

  • SHA512

    3e92bc5361f596c4170e728132beb74a1be262c2fef1f9a3a523442dfe29485384b816fe7fd4fbecb3f9bfc716ab8fbd80bb597b5b96acec45132d66f38fffba

  • SSDEEP

    3145728:ssbiS6xjKcBa6R2qHO5izBVnG0iWMstB2Ox0aL3:b2SWNa6HHCittieBm

Malware Config

Targets

    • Target

      OTP_PAID_BY_VREX.exe

    • Size

      106.8MB

    • MD5

      e306660259c9cf4c91a776374ddd2413

    • SHA1

      5389b87cf600ab8aea6c5287923bb9f360bbc592

    • SHA256

      a8d70af3729a35a9ad8903be249b81e69f069a37113cade2bb0736e967a8c9f3

    • SHA512

      3e92bc5361f596c4170e728132beb74a1be262c2fef1f9a3a523442dfe29485384b816fe7fd4fbecb3f9bfc716ab8fbd80bb597b5b96acec45132d66f38fffba

    • SSDEEP

      3145728:ssbiS6xjKcBa6R2qHO5izBVnG0iWMstB2Ox0aL3:b2SWNa6HHCittieBm

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks