General

  • Target

    source_prepared.exe

  • Size

    80.3MB

  • Sample

    240903-qs7lhayhla

  • MD5

    9a2b6d08a722fa6b53221a9bfa35b561

  • SHA1

    f771ba1246f07fd72dcd8b8dcc4b5038c4df02f1

  • SHA256

    de7b203db57da70f0e76b08aed448897e8ca954a6a4d4aeae2d8777964579589

  • SHA512

    e152b9f049a71e3adb2e1d7660d36a54b4415839fbe7f274fe3480251eb65e167b1e2ce478919d0db4d6baa94ca72652e44952aa093759fc2b1cfb9e1d5591e8

  • SSDEEP

    1572864:T075Qgl0WlD7vPSk8IpG7V+VPhqFOE70slgw3iYgj+h58sMw3BrJ2:T075xeYLSkB05awFbewJ5l

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      80.3MB

    • MD5

      9a2b6d08a722fa6b53221a9bfa35b561

    • SHA1

      f771ba1246f07fd72dcd8b8dcc4b5038c4df02f1

    • SHA256

      de7b203db57da70f0e76b08aed448897e8ca954a6a4d4aeae2d8777964579589

    • SHA512

      e152b9f049a71e3adb2e1d7660d36a54b4415839fbe7f274fe3480251eb65e167b1e2ce478919d0db4d6baa94ca72652e44952aa093759fc2b1cfb9e1d5591e8

    • SSDEEP

      1572864:T075Qgl0WlD7vPSk8IpG7V+VPhqFOE70slgw3iYgj+h58sMw3BrJ2:T075xeYLSkB05awFbewJ5l

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks