General

  • Target

    69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37

  • Size

    80.9MB

  • Sample

    240828-vgbf5syelr

  • MD5

    01dfff92552543795a59f3965f8ca75a

  • SHA1

    761930c16bf20277ff440fb35c73639510ff68be

  • SHA256

    69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37

  • SHA512

    e3c0bb33e383e5f9b5dd757c46fa4009981c619294af0cd23464fbc5b772fb473b50096246969dd22ac3f484a81a68e18310c3b54402e455e7d5b24108c629ef

  • SSDEEP

    1572864:UvxZQglXJdW67vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IH9rWocJXt:UvxZxRLVeSkB05awb+Tfe25F09rit

Malware Config

Targets

    • Target

      69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37

    • Size

      80.9MB

    • MD5

      01dfff92552543795a59f3965f8ca75a

    • SHA1

      761930c16bf20277ff440fb35c73639510ff68be

    • SHA256

      69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37

    • SHA512

      e3c0bb33e383e5f9b5dd757c46fa4009981c619294af0cd23464fbc5b772fb473b50096246969dd22ac3f484a81a68e18310c3b54402e455e7d5b24108c629ef

    • SSDEEP

      1572864:UvxZQglXJdW67vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IH9rWocJXt:UvxZxRLVeSkB05awb+Tfe25F09rit

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks