General

  • Target

    court.exe

  • Size

    76.8MB

  • Sample

    240907-tjh4bstgpd

  • MD5

    4a3d293473a4b4f0c119ed07b67a5d68

  • SHA1

    0c648cb275768d364e8982264e620accd5467f94

  • SHA256

    cf4d12d1d2f55b8b507ee89e69b245a848067e60fe4898f09d61e5bf6c3b8023

  • SHA512

    39bfc2a5ed7cab474d8e80184f5e25a803aeb2643f9269f4b25df63546213d53f5283801f8a8d447ca4792aaa44211e8c851aed29ff8694b6ae84c11de56aa30

  • SSDEEP

    1572864:MvHcRldWImSk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgY3uuTG/Z9Uu:MvHcRjhmSkB05awcfhdCpuU3HG9U

Malware Config

Targets

    • Target

      court.exe

    • Size

      76.8MB

    • MD5

      4a3d293473a4b4f0c119ed07b67a5d68

    • SHA1

      0c648cb275768d364e8982264e620accd5467f94

    • SHA256

      cf4d12d1d2f55b8b507ee89e69b245a848067e60fe4898f09d61e5bf6c3b8023

    • SHA512

      39bfc2a5ed7cab474d8e80184f5e25a803aeb2643f9269f4b25df63546213d53f5283801f8a8d447ca4792aaa44211e8c851aed29ff8694b6ae84c11de56aa30

    • SSDEEP

      1572864:MvHcRldWImSk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgY3uuTG/Z9Uu:MvHcRjhmSkB05awcfhdCpuU3HG9U

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks