General

  • Target

    injector.exe

  • Size

    52.7MB

  • Sample

    240930-cqabbssfnl

  • MD5

    bdf2dc6a2db53d89921f67c06acab3aa

  • SHA1

    760c413163b10f2addd24ee8f80fbfd2136afc6a

  • SHA256

    8080028bb5cc0fba7e1d8c8a8e521f02f8c6c0ee43acc0ef4f0bc4d055c20123

  • SHA512

    4388c623834922af1d81d8436a38baacf0fd9a7fd71a5a14c735d13f15b2c471435bdcc58968dce6f0a78dbf0c51755c594af9c0b02ebe03e950b13643695e94

  • SSDEEP

    1572864:kvHcRlBWQmSk8IpG7V+VPhqFxE7ulHQBBl7dEayyOl:kvHcRr/mSkB05awFjdQnl7dE93

Malware Config

Targets

    • Target

      injector.exe

    • Size

      52.7MB

    • MD5

      bdf2dc6a2db53d89921f67c06acab3aa

    • SHA1

      760c413163b10f2addd24ee8f80fbfd2136afc6a

    • SHA256

      8080028bb5cc0fba7e1d8c8a8e521f02f8c6c0ee43acc0ef4f0bc4d055c20123

    • SHA512

      4388c623834922af1d81d8436a38baacf0fd9a7fd71a5a14c735d13f15b2c471435bdcc58968dce6f0a78dbf0c51755c594af9c0b02ebe03e950b13643695e94

    • SSDEEP

      1572864:kvHcRlBWQmSk8IpG7V+VPhqFxE7ulHQBBl7dEayyOl:kvHcRr/mSkB05awFjdQnl7dE93

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks