General

  • Target

    sex.exe

  • Size

    77.0MB

  • Sample

    241003-v9veqaxhnm

  • MD5

    2ed22f694e4707e52f9e15e84e9d3618

  • SHA1

    23804011b6af36544d66cc3b4f00920b70c862ee

  • SHA256

    3ad8d1c1b31ee9e7f598b1cac7044e93894f27b70b05a037adac8d7bfe54eebe

  • SHA512

    1c9c9a668bac56ca6806cbec86119369e3814131be19daa082a29baed8a59412bb9cab8e8dcc659d3a441ed322d67fea964f56997e6d513a176bbbffcd10b32d

  • SSDEEP

    1572864:3cRlAWjmSk8IpG7V+VPhqFxE7ulh8qriYweyJulZUdgq4lFFd72:3cRWcmSkB05awFfLipuG4tZ2

Malware Config

Targets

    • Target

      sex.exe

    • Size

      77.0MB

    • MD5

      2ed22f694e4707e52f9e15e84e9d3618

    • SHA1

      23804011b6af36544d66cc3b4f00920b70c862ee

    • SHA256

      3ad8d1c1b31ee9e7f598b1cac7044e93894f27b70b05a037adac8d7bfe54eebe

    • SHA512

      1c9c9a668bac56ca6806cbec86119369e3814131be19daa082a29baed8a59412bb9cab8e8dcc659d3a441ed322d67fea964f56997e6d513a176bbbffcd10b32d

    • SSDEEP

      1572864:3cRlAWjmSk8IpG7V+VPhqFxE7ulh8qriYweyJulZUdgq4lFFd72:3cRWcmSkB05awFfLipuG4tZ2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks