General

  • Target

    main.exe

  • Size

    77.0MB

  • Sample

    240926-c71vlsshpj

  • MD5

    54aaf74e6e207e19c62827f9ee96391a

  • SHA1

    4e1b7ffb3df77ca5e0449b63dc392eadac2c04c2

  • SHA256

    6c438401c6760148d96ac396e624d5deceaef9b04af743222b36f631785c96cb

  • SHA512

    fa2ada072d8a1d07e59089b10e43ff73d82ab2c07aa7083f810232136a129ae482a09d26bbdf860a36edb48522359f049cc12ab95fe68f59445ae9211f357493

  • SSDEEP

    1572864:6evHcRlnWXmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdgD7OrayyOlqH1O3:6evHcRVkmSkB05awFjdQnApu/7Or93cc

Malware Config

Targets

    • Target

      main.exe

    • Size

      77.0MB

    • MD5

      54aaf74e6e207e19c62827f9ee96391a

    • SHA1

      4e1b7ffb3df77ca5e0449b63dc392eadac2c04c2

    • SHA256

      6c438401c6760148d96ac396e624d5deceaef9b04af743222b36f631785c96cb

    • SHA512

      fa2ada072d8a1d07e59089b10e43ff73d82ab2c07aa7083f810232136a129ae482a09d26bbdf860a36edb48522359f049cc12ab95fe68f59445ae9211f357493

    • SSDEEP

      1572864:6evHcRlnWXmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdgD7OrayyOlqH1O3:6evHcRVkmSkB05awFjdQnApu/7Or93cc

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks