General

  • Target

    source_prepared.exe

  • Size

    77.0MB

  • Sample

    240926-p63c9s1fre

  • MD5

    df9999eac15629d0f0cbf18b9a3ca8a6

  • SHA1

    ea567ab456d0ecd1cf90baf37c0f3e993f32e12c

  • SHA256

    05b4b7da4044d677bbe52af40e96057909c62ae99e76426cf7109ed45288ed0c

  • SHA512

    301808a9cc3faad0360899a9c69390a226b86af02649c59e19f8e1c9321226ca4c9c74cdf116aa3d83bbc758b1f363f229598d20766dc137cccfc6ced5bf38e2

  • SSDEEP

    1572864:GvHcRlnWQmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdgD7rrxyyOlqH1O3:GvHcRVbmSkB05awFjdQnApu/7rrg3cO3

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      77.0MB

    • MD5

      df9999eac15629d0f0cbf18b9a3ca8a6

    • SHA1

      ea567ab456d0ecd1cf90baf37c0f3e993f32e12c

    • SHA256

      05b4b7da4044d677bbe52af40e96057909c62ae99e76426cf7109ed45288ed0c

    • SHA512

      301808a9cc3faad0360899a9c69390a226b86af02649c59e19f8e1c9321226ca4c9c74cdf116aa3d83bbc758b1f363f229598d20766dc137cccfc6ced5bf38e2

    • SSDEEP

      1572864:GvHcRlnWQmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdgD7rrxyyOlqH1O3:GvHcRVbmSkB05awFjdQnApu/7rrg3cO3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks