General

  • Target

    source_prepared.exe

  • Size

    76.8MB

  • Sample

    240929-q6vtvszfkg

  • MD5

    bf4c26a1f9c449ba0cdc0dfcef64da56

  • SHA1

    99815b5bb549e6719a4c0c5968a21700c224054d

  • SHA256

    d4bd3928bc8a16c9377fdebf15da360c6c5c6b07871c7590d43a58a465857558

  • SHA512

    83dca20749b0464355f394a01fde09b80f728df8794e05e5820b16d2dfbdb329df3e4ad044786492282f2ca950dce9e4e101644ac7f3169be19274e718b04878

  • SSDEEP

    1572864:+vHcRl3WdmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1herRdETV37U:+vHcR50mSkB05awcf2LVpuxherD4o

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      76.8MB

    • MD5

      bf4c26a1f9c449ba0cdc0dfcef64da56

    • SHA1

      99815b5bb549e6719a4c0c5968a21700c224054d

    • SHA256

      d4bd3928bc8a16c9377fdebf15da360c6c5c6b07871c7590d43a58a465857558

    • SHA512

      83dca20749b0464355f394a01fde09b80f728df8794e05e5820b16d2dfbdb329df3e4ad044786492282f2ca950dce9e4e101644ac7f3169be19274e718b04878

    • SSDEEP

      1572864:+vHcRl3WdmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1herRdETV37U:+vHcR50mSkB05awcf2LVpuxherD4o

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks