General

  • Target

    source_prepared.exe

  • Size

    77.6MB

  • Sample

    240930-ynh2cawgmg

  • MD5

    00e2eee2a4da72dbfa470b007427ed47

  • SHA1

    8548e180d10cfefa6877a90ab40d1cfcf9a0ea82

  • SHA256

    85671090c27aa08c5d644e8fe23b27e47ba6a98c3b0f3f71af37f7c6bacbd88c

  • SHA512

    b4987987c34cacb24054b9112a9712cfb267400371d065f1a541213be157a9a93ac3107afe2f789bbfd9b288b51bec878b654038407e175f3b01f87e39987fce

  • SSDEEP

    1572864:favHcRl3WGmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1hmrRdETV37U:SvHcR5zmSkB05awcf2LVpuxhmrD4o

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      77.6MB

    • MD5

      00e2eee2a4da72dbfa470b007427ed47

    • SHA1

      8548e180d10cfefa6877a90ab40d1cfcf9a0ea82

    • SHA256

      85671090c27aa08c5d644e8fe23b27e47ba6a98c3b0f3f71af37f7c6bacbd88c

    • SHA512

      b4987987c34cacb24054b9112a9712cfb267400371d065f1a541213be157a9a93ac3107afe2f789bbfd9b288b51bec878b654038407e175f3b01f87e39987fce

    • SSDEEP

      1572864:favHcRl3WGmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1hmrRdETV37U:SvHcR5zmSkB05awcf2LVpuxhmrD4o

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks