General

  • Target

    a02c6673d87414ead1acbcbf6e902716983e86b7ee86ec7e858d8e082faa0662

  • Size

    80.9MB

  • Sample

    240828-b72apszfpf

  • MD5

    bab90fb406091f997154ad23d33cc14f

  • SHA1

    c208f2394999db000e44e2bbf87b6805376efc52

  • SHA256

    a02c6673d87414ead1acbcbf6e902716983e86b7ee86ec7e858d8e082faa0662

  • SHA512

    dc65221a56a31aa6d98ebd4a3ab4bd5e93ef0ae77016be8fa51d84ed2ba250b4678c7871dda6949e45eb32e733a8dac0e8f114918515f27765ab30b4e180cf4d

  • SSDEEP

    1572864:IvxZQglnWU7vaSk8IpG7V+VPhqYdfCE70lgLiYgj+h58sMw74DP+wJk:IvxZx95eSkB05awcfAeF53CK

Malware Config

Targets

    • Target

      a02c6673d87414ead1acbcbf6e902716983e86b7ee86ec7e858d8e082faa0662

    • Size

      80.9MB

    • MD5

      bab90fb406091f997154ad23d33cc14f

    • SHA1

      c208f2394999db000e44e2bbf87b6805376efc52

    • SHA256

      a02c6673d87414ead1acbcbf6e902716983e86b7ee86ec7e858d8e082faa0662

    • SHA512

      dc65221a56a31aa6d98ebd4a3ab4bd5e93ef0ae77016be8fa51d84ed2ba250b4678c7871dda6949e45eb32e733a8dac0e8f114918515f27765ab30b4e180cf4d

    • SSDEEP

      1572864:IvxZQglnWU7vaSk8IpG7V+VPhqYdfCE70lgLiYgj+h58sMw74DP+wJk:IvxZx95eSkB05awcfAeF53CK

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks