General
-
Target
court.exe
-
Size
76.8MB
-
Sample
240907-tjh4bstgpd
-
MD5
4a3d293473a4b4f0c119ed07b67a5d68
-
SHA1
0c648cb275768d364e8982264e620accd5467f94
-
SHA256
cf4d12d1d2f55b8b507ee89e69b245a848067e60fe4898f09d61e5bf6c3b8023
-
SHA512
39bfc2a5ed7cab474d8e80184f5e25a803aeb2643f9269f4b25df63546213d53f5283801f8a8d447ca4792aaa44211e8c851aed29ff8694b6ae84c11de56aa30
-
SSDEEP
1572864:MvHcRldWImSk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgY3uuTG/Z9Uu:MvHcRjhmSkB05awcfhdCpuU3HG9U
Behavioral task
behavioral1
Sample
court.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
court.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
court.exe
-
Size
76.8MB
-
MD5
4a3d293473a4b4f0c119ed07b67a5d68
-
SHA1
0c648cb275768d364e8982264e620accd5467f94
-
SHA256
cf4d12d1d2f55b8b507ee89e69b245a848067e60fe4898f09d61e5bf6c3b8023
-
SHA512
39bfc2a5ed7cab474d8e80184f5e25a803aeb2643f9269f4b25df63546213d53f5283801f8a8d447ca4792aaa44211e8c851aed29ff8694b6ae84c11de56aa30
-
SSDEEP
1572864:MvHcRldWImSk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgY3uuTG/Z9Uu:MvHcRjhmSkB05awcfhdCpuU3HG9U
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1