General

  • Target

    loader.exe

  • Size

    76.9MB

  • Sample

    240914-1xkmmsyhnc

  • MD5

    c36f2591201fc0e9cecf76b8b3332786

  • SHA1

    c41e1c2ede2256764c4741833d2b6195c5260d77

  • SHA256

    28ac6ec93b5282c62194d78a42e2d74c3ecea0949ba4f1d0530acbf50a8c33a6

  • SHA512

    415e34d8b49681f91a9fb3fe421f14f6ce680eb2444a8cbe95197fe180dbc95af7c163dc6e92dd15ae3fba9c7ac85fae84c38eb2ec6d7fde22b866519b25bf3d

  • SSDEEP

    1572864:PvHcRl3W8mSk8IpG7V+VPhqYdfzE7tlHegiYweyJulZUdghhEmSNOV3hC:PvHcR5hmSkB05awcf2dMpuFhfg

Malware Config

Targets

    • Target

      loader.exe

    • Size

      76.9MB

    • MD5

      c36f2591201fc0e9cecf76b8b3332786

    • SHA1

      c41e1c2ede2256764c4741833d2b6195c5260d77

    • SHA256

      28ac6ec93b5282c62194d78a42e2d74c3ecea0949ba4f1d0530acbf50a8c33a6

    • SHA512

      415e34d8b49681f91a9fb3fe421f14f6ce680eb2444a8cbe95197fe180dbc95af7c163dc6e92dd15ae3fba9c7ac85fae84c38eb2ec6d7fde22b866519b25bf3d

    • SSDEEP

      1572864:PvHcRl3W8mSk8IpG7V+VPhqYdfzE7tlHegiYweyJulZUdghhEmSNOV3hC:PvHcR5hmSkB05awcf2dMpuFhfg

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks