General

  • Target

    source_prepared.exe

  • Size

    76.9MB

  • Sample

    241005-2rsazazcrh

  • MD5

    b7e4778e468296b554fbdb1af170e3d4

  • SHA1

    811d4741c396dd567025eb3ce86eb4b5b766d8ca

  • SHA256

    906fbe03dee0a06faa16255e0b448808815006578ab994bd875d0c247fa5ecca

  • SHA512

    0c569172e250217de26034099971ee2c01093afa2997cc4f58548a35bf6db83bc32c576529a3746c1cb337ae6ddf945be09970f32cb39abd4c36d12ba653b0ad

  • SSDEEP

    1572864:JcRlAWImSk8IpG7V+VPhqFxE7ulh8qfiYweyJulZUdgq4jnBd72:JcRWPmSkB05awFfLKpuG4dZ2

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      76.9MB

    • MD5

      b7e4778e468296b554fbdb1af170e3d4

    • SHA1

      811d4741c396dd567025eb3ce86eb4b5b766d8ca

    • SHA256

      906fbe03dee0a06faa16255e0b448808815006578ab994bd875d0c247fa5ecca

    • SHA512

      0c569172e250217de26034099971ee2c01093afa2997cc4f58548a35bf6db83bc32c576529a3746c1cb337ae6ddf945be09970f32cb39abd4c36d12ba653b0ad

    • SSDEEP

      1572864:JcRlAWImSk8IpG7V+VPhqFxE7ulh8qfiYweyJulZUdgq4jnBd72:JcRWPmSkB05awFfLKpuG4dZ2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks