General

  • Target

    release 2.21v.rar

  • Size

    79.9MB

  • Sample

    240829-v7k39svepm

  • MD5

    cbca16a30d933481b2b42ad9ebf04e6c

  • SHA1

    68a9ead8c6c56bf8796a7c8483f3870f566696cd

  • SHA256

    3953661397d96baa773cf45497e1f8216046663172924fed0c8f0fc5b32bc18c

  • SHA512

    fa1656511758a4edeaea838d3847cd8f588aeafe72557fb0ea442418c874bd117945e2cdc642173d96471d7d418f20d603ae21a91b48c20abcc3fdc758b99c29

  • SSDEEP

    1572864:Xf54DKqY0wZE3HMkvfuT0m0IcAZmu94KqPyaBL94xDT7vgUA33ZtW:hGKr+XBO70vu94FIDT7vBA5o

Malware Config

Targets

    • Target

      RUES.EXTv2.13v.exe

    • Size

      76.8MB

    • MD5

      53fa6aaa2bf0fa8ff39523e41762a4b5

    • SHA1

      031420d84303cc0764a78e4b6c562d2e0ae09fbf

    • SHA256

      0faa6e0066477085639fe21d56f8f64d43d32bce9ceb6cfda00d9e08332667d6

    • SHA512

      f3bace1297a80459d0f995eb49fdfc1a5fc5c9171e60d3f44423f4bfc2564d21bb291c9f05906b3d7e3b51b5a67a50dc4ed328553faded5be769dabe78fb8a9f

    • SSDEEP

      1572864:IvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghhCreDEjV37U:IvHcRY6hTSkB05awcfLdMpuFhCrOQo

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks