General

  • Target

    source_prepared.exe

  • Size

    33.9MB

  • Sample

    240913-2zk7mavbje

  • MD5

    047f68473fd17519ace735a437165db2

  • SHA1

    56bde6855225a30e7efb530ca425e958fc3c09d3

  • SHA256

    22b05512682fc18e6089906a2ad6757f9a51965f38cb55182244eeb1825dd8fb

  • SHA512

    f14469c04e2bbf41053a838e5314c2286b897cbbb5175c066d9bd47c9702afbbc3fc2f97d69b1949d3c6573edc6bf01ecac0dbe16eb1c5a40a40fcca20ad8edc

  • SSDEEP

    786432:K9Z9xbdQZ8+W8YMO79l9zcY87HC50WS69v52lQpr4:8vxZQHWLvNE7g9x28r

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      33.9MB

    • MD5

      047f68473fd17519ace735a437165db2

    • SHA1

      56bde6855225a30e7efb530ca425e958fc3c09d3

    • SHA256

      22b05512682fc18e6089906a2ad6757f9a51965f38cb55182244eeb1825dd8fb

    • SHA512

      f14469c04e2bbf41053a838e5314c2286b897cbbb5175c066d9bd47c9702afbbc3fc2f97d69b1949d3c6573edc6bf01ecac0dbe16eb1c5a40a40fcca20ad8edc

    • SSDEEP

      786432:K9Z9xbdQZ8+W8YMO79l9zcY87HC50WS69v52lQpr4:8vxZQHWLvNE7g9x28r

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks