General

  • Target

    Celery.exe

  • Size

    38.9MB

  • Sample

    240920-prwbeawfph

  • MD5

    1958d56ce89570d458ad70e205129d90

  • SHA1

    366cc40327d36b79531e0df984c86a79b1c51858

  • SHA256

    8caaad73fde7729f69f2b1eac55aaf7f3b04a5a16e6043eeeb1c4d13539979dc

  • SHA512

    0afe2380faf8527bad4c2fa42210de99a69fa6e0e2b082e669b959629b3cea6aa41769244576b3a5e370432bbf13dfe43a90e9eec2ec9419687b9dcb20dfc663

  • SSDEEP

    786432:u9Z9xbdQglp8+W8YM67vD7laO45zcY87HC5QlstXcWSK9v9UlQxrP:wvxZQgl3WLp7vwPE7hlgB9lUmr

Malware Config

Targets

    • Target

      Celery.exe

    • Size

      38.9MB

    • MD5

      1958d56ce89570d458ad70e205129d90

    • SHA1

      366cc40327d36b79531e0df984c86a79b1c51858

    • SHA256

      8caaad73fde7729f69f2b1eac55aaf7f3b04a5a16e6043eeeb1c4d13539979dc

    • SHA512

      0afe2380faf8527bad4c2fa42210de99a69fa6e0e2b082e669b959629b3cea6aa41769244576b3a5e370432bbf13dfe43a90e9eec2ec9419687b9dcb20dfc663

    • SSDEEP

      786432:u9Z9xbdQglp8+W8YM67vD7laO45zcY87HC5QlstXcWSK9v9UlQxrP:wvxZQgl3WLp7vwPE7hlgB9lUmr

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks