General

  • Target

    source_prepared.exe

  • Size

    102.9MB

  • Sample

    240831-fjc1eswhpd

  • MD5

    a4d1f3b1d7b23eaf8c84a4277795a798

  • SHA1

    68425c5b196792d835dd2a7f00dd5011472131fb

  • SHA256

    dd0d136f7e0351a295b25bc601e8233e80ab7223900818cb5aa68a73b096eead

  • SHA512

    94db751bd98508d5c54bbe7eba733b10d4e441d7822ec78fcde4840663d491cd7fa7542692889254b24602060c3cf3a871a7d36725b30184bcaf4b937964882f

  • SSDEEP

    3145728:fhCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB8a7rOQo:frgSWNa6sHCip1XcB8a7

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      102.9MB

    • MD5

      a4d1f3b1d7b23eaf8c84a4277795a798

    • SHA1

      68425c5b196792d835dd2a7f00dd5011472131fb

    • SHA256

      dd0d136f7e0351a295b25bc601e8233e80ab7223900818cb5aa68a73b096eead

    • SHA512

      94db751bd98508d5c54bbe7eba733b10d4e441d7822ec78fcde4840663d491cd7fa7542692889254b24602060c3cf3a871a7d36725b30184bcaf4b937964882f

    • SSDEEP

      3145728:fhCOb8S6xjKcBa6c2qHO5iVIinGQbRe0zJcB8a7rOQo:frgSWNa6sHCip1XcB8a7

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks