General

  • Target

    9f9f993ca6b17334a23029994a607f06e1769ae55284931fdef96a5bce2446a4

  • Size

    77.0MB

  • Sample

    240918-z5p2natfrm

  • MD5

    e401c9b7b61b6fcf765d752d8f5d94cb

  • SHA1

    4b1deaf2d690acd4ff460f336db8eec62080ff84

  • SHA256

    9f9f993ca6b17334a23029994a607f06e1769ae55284931fdef96a5bce2446a4

  • SHA512

    d91fe689958c44135a4cea7f1aebaf801d4bd628945c9602cc57cee8c71cc7ea2c74377670767f18c450c0824b881360596640c52611e8bc40740367207f2e06

  • SSDEEP

    1572864:NvHcRlnWUmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdgD7U3ayyOlqH1O3:NvHcRVLmSkB05awFjdQnApu/7U393cO3

Malware Config

Targets

    • Target

      9f9f993ca6b17334a23029994a607f06e1769ae55284931fdef96a5bce2446a4

    • Size

      77.0MB

    • MD5

      e401c9b7b61b6fcf765d752d8f5d94cb

    • SHA1

      4b1deaf2d690acd4ff460f336db8eec62080ff84

    • SHA256

      9f9f993ca6b17334a23029994a607f06e1769ae55284931fdef96a5bce2446a4

    • SHA512

      d91fe689958c44135a4cea7f1aebaf801d4bd628945c9602cc57cee8c71cc7ea2c74377670767f18c450c0824b881360596640c52611e8bc40740367207f2e06

    • SSDEEP

      1572864:NvHcRlnWUmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdgD7U3ayyOlqH1O3:NvHcRVLmSkB05awFjdQnApu/7U393cO3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks