General

  • Target

    HellifyBoosterV3.exe

  • Size

    10.0MB

  • Sample

    240920-j1qvdswfpb

  • MD5

    b26d8f6b8cb793c541db1c70bcb378ae

  • SHA1

    1ce3176891fe24de3f39e4459b98455e62ef5ec7

  • SHA256

    39c7c2974767c933a5234edf6b0e12c5cd2b8d7482685b4fdab75bd693486f74

  • SHA512

    bd634fb47cb45ffbc30dc5dc73a378db889c511f268e58fb49410ae7c8a24a9d48dbadb670ba55e22dc7c80141e100fa26b8b463d328bcc7fe88012cd953dcec

  • SSDEEP

    196608:l9p93z1+0ftfpkwUpDjVfV2pBVOv9ODGiTxr87GFTj7IzcQY6gIxwZWG:lX3+eHhUVjVNoVOv9ODGiTxA20zA6Zxs

Malware Config

Targets

    • Target

      HellifyBoosterV3.exe

    • Size

      10.0MB

    • MD5

      b26d8f6b8cb793c541db1c70bcb378ae

    • SHA1

      1ce3176891fe24de3f39e4459b98455e62ef5ec7

    • SHA256

      39c7c2974767c933a5234edf6b0e12c5cd2b8d7482685b4fdab75bd693486f74

    • SHA512

      bd634fb47cb45ffbc30dc5dc73a378db889c511f268e58fb49410ae7c8a24a9d48dbadb670ba55e22dc7c80141e100fa26b8b463d328bcc7fe88012cd953dcec

    • SSDEEP

      196608:l9p93z1+0ftfpkwUpDjVfV2pBVOv9ODGiTxr87GFTj7IzcQY6gIxwZWG:lX3+eHhUVjVNoVOv9ODGiTxA20zA6Zxs

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks