General

  • Target

    dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287

  • Size

    81.3MB

  • Sample

    240827-xa54aaxcmj

  • MD5

    6a2e3df8eedc8b30301a2a031cdba7b5

  • SHA1

    725a3aeae37708b512a9fcf02228480ee237a918

  • SHA256

    dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287

  • SHA512

    8dc377593faca870963a59abb60b1fbc79b21bc335c894b45c376566a986f2c6813f6cb84380646037e81757f38887fbbdf36339236a8a6e10d01b9e85a44d42

  • SSDEEP

    1572864:JXAcQglXvDWq7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIp9vWZcJXt:JXAc5RL/1SkB05awO+6Qe+53+9vDt

Malware Config

Targets

    • Target

      dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287

    • Size

      81.3MB

    • MD5

      6a2e3df8eedc8b30301a2a031cdba7b5

    • SHA1

      725a3aeae37708b512a9fcf02228480ee237a918

    • SHA256

      dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287

    • SHA512

      8dc377593faca870963a59abb60b1fbc79b21bc335c894b45c376566a986f2c6813f6cb84380646037e81757f38887fbbdf36339236a8a6e10d01b9e85a44d42

    • SSDEEP

      1572864:JXAcQglXvDWq7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIp9vWZcJXt:JXAc5RL/1SkB05awO+6Qe+53+9vDt

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks