General

  • Target

    source_prepared.exe

  • Size

    77.6MB

  • Sample

    240930-zn5qsaydqf

  • MD5

    bd3841fcff1576b306af36a1603820d3

  • SHA1

    1a20410f5b8127d8c26f8db0e365dbab06e2f228

  • SHA256

    97b9482ed03c463e40c199b7755174c31bebd47be0a12c8f4744027491b65dc3

  • SHA512

    98e1218a0fe97be04a556d0142895ca2ecbeb6839ec723f0e2492194b931a02e81b1ccb83c88a28ca1a5dfa3d1e394eb344b2f3793a2361533e29875e9e611ba

  • SSDEEP

    1572864:uQvHcRl3WwmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1hKrRdETV37U:vvHcR5RmSkB05awcf2LVpuxhKrD4o

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      77.6MB

    • MD5

      bd3841fcff1576b306af36a1603820d3

    • SHA1

      1a20410f5b8127d8c26f8db0e365dbab06e2f228

    • SHA256

      97b9482ed03c463e40c199b7755174c31bebd47be0a12c8f4744027491b65dc3

    • SHA512

      98e1218a0fe97be04a556d0142895ca2ecbeb6839ec723f0e2492194b931a02e81b1ccb83c88a28ca1a5dfa3d1e394eb344b2f3793a2361533e29875e9e611ba

    • SSDEEP

      1572864:uQvHcRl3WwmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1hKrRdETV37U:vvHcR5RmSkB05awcf2LVpuxhKrD4o

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks