General

  • Target

    source_prepared.exe

  • Size

    33.7MB

  • Sample

    240914-1ghs4sxhna

  • MD5

    696aa3bcc48503c60274a32c804590af

  • SHA1

    0830ee532173500d7e505e9172f52ab4e53130db

  • SHA256

    6be18c1a564d443ef9946a49322f7628676e0e3f68245fb7b739e12ebc3dc377

  • SHA512

    2e69c32457b212798112f3aa577f700ea865191b7771b5c808e2013c3f031908549cafc09425012d3ccfd64bbf77c4e5761abaa873c275d07e0e934092b3e631

  • SSDEEP

    786432:iu9Z9xbdQMFxW8YMO7Kl9zcY87HC5hWw59v5XlQfr4:iwvxZQcWLv8E7M9xX8r

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      33.7MB

    • MD5

      696aa3bcc48503c60274a32c804590af

    • SHA1

      0830ee532173500d7e505e9172f52ab4e53130db

    • SHA256

      6be18c1a564d443ef9946a49322f7628676e0e3f68245fb7b739e12ebc3dc377

    • SHA512

      2e69c32457b212798112f3aa577f700ea865191b7771b5c808e2013c3f031908549cafc09425012d3ccfd64bbf77c4e5761abaa873c275d07e0e934092b3e631

    • SSDEEP

      786432:iu9Z9xbdQMFxW8YMO7Kl9zcY87HC5hWw59v5XlQfr4:iwvxZQcWLv8E7M9xX8r

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks