General

  • Target

    Gerzemer.exe

  • Size

    77.4MB

  • Sample

    241007-k71hvaxejl

  • MD5

    3b778de1a78ebe2b223b240edae4599c

  • SHA1

    d7cebb6950dad9f04b205994430cc779c8f2c9a2

  • SHA256

    ba3e34a7d0d0aedf0cedec75ad2db304acc8f54f8f5cc983f1cc0d069d5ad636

  • SHA512

    fc6960cc01f7c14ead5b82ba6e44f6261811533da0731f7e6b4f4ac1f6d56b49f45f185969a674291d030f3ad7d4d4c5adf200922a1d84d4dcce298defd89743

  • SSDEEP

    1572864:2cRl3W4mSk8IpG7V+VPhqYdfzE7tlhTEiYweyJulZUdg1horRdE3V37U:2cR5lmSkB05awcf2LppuxhorDKo

Malware Config

Targets

    • Target

      Gerzemer.exe

    • Size

      77.4MB

    • MD5

      3b778de1a78ebe2b223b240edae4599c

    • SHA1

      d7cebb6950dad9f04b205994430cc779c8f2c9a2

    • SHA256

      ba3e34a7d0d0aedf0cedec75ad2db304acc8f54f8f5cc983f1cc0d069d5ad636

    • SHA512

      fc6960cc01f7c14ead5b82ba6e44f6261811533da0731f7e6b4f4ac1f6d56b49f45f185969a674291d030f3ad7d4d4c5adf200922a1d84d4dcce298defd89743

    • SSDEEP

      1572864:2cRl3W4mSk8IpG7V+VPhqYdfzE7tlhTEiYweyJulZUdg1horRdE3V37U:2cR5lmSkB05awcf2LppuxhorDKo

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks