General

  • Target

    Celex Cracked Credits Runtz.zip

  • Size

    76.2MB

  • Sample

    240903-fyjfraxhnk

  • MD5

    0219d0d9b1cf092f7ed15b7737c1ad16

  • SHA1

    3d6ae3312656815fb4a42289c552cd311d30c5b9

  • SHA256

    b5549b15a70bd190fd658ce5e11c97fe54075bbb06f4ec5c393c3aa8cf2aaed3

  • SHA512

    6a2fbb98064380516b66f9a7e9654fc7a4183242527282dd55d08c92670f7444219ec4c6c7e560f88ff1e4c2ca1fdcbb5f660a63d07eb5c71d11dfb3bc53e7c7

  • SSDEEP

    1572864:8GcnmEHI8I8KPv+FDq/Jn9DPbUNqmnrgtB2/EY8QhIjK5mMr6JNX7xi:8GcHqPgoJnxGgtBCECHj6vXVi

Malware Config

Targets

    • Target

      Celex Cracked Credits Runtz/CelexCracked By Runtz.exe

    • Size

      76.5MB

    • MD5

      c32e966fc462555c5d1eaf1aeb30dbfc

    • SHA1

      ff1b7bf4d4d29fd00b8d1087b39ecd0edf63e11c

    • SHA256

      69c81c3157acf3147df7a3aef82432dfc76d24ca7aafe2c34a24bb4bb196ab02

    • SHA512

      bde9dc630cb75c30161e377c42c56ea11404aec30f468d27924141f1fc85ebd2a7402efe72d3b729dc3379dc4ec47d42c22866fdb56fd1e35533e5dc7e1329a4

    • SSDEEP

      1572864:pvhQ6l1WF7vDSk8IpG7V+VPhqS0E7WTylPDDiY4MHHLeqPNLtD6qIZ0Awf:pvh1vKPSkB05awSgTy5IMHVLt+3Nwf

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks