General

  • Target

    rat.exe

  • Size

    30.6MB

  • Sample

    241009-t16wqaygjp

  • MD5

    dbbfefbdaf205b4b407525aec7fbe773

  • SHA1

    d7e7c8a3aca2edf52bdafde4812aa14ab5fb1c66

  • SHA256

    09619c6b7f13bb6463bf753ae87c5232b9bca99630fee5d0ebc6edc8a45870f2

  • SHA512

    913c043c5a990f79a534d5bf79350592ff1880c8cb84887cde2a6372d52738f175eb42d55455c368e48e6ced8e819b0300c56748b61c563326fdeca0279242fc

  • SSDEEP

    786432:rcKwW847XzcY876oBBrW88vWBGeaRAqrT:rcBWFXE7hBB77UeayWT

Malware Config

Targets

    • Target

      rat.exe

    • Size

      30.6MB

    • MD5

      dbbfefbdaf205b4b407525aec7fbe773

    • SHA1

      d7e7c8a3aca2edf52bdafde4812aa14ab5fb1c66

    • SHA256

      09619c6b7f13bb6463bf753ae87c5232b9bca99630fee5d0ebc6edc8a45870f2

    • SHA512

      913c043c5a990f79a534d5bf79350592ff1880c8cb84887cde2a6372d52738f175eb42d55455c368e48e6ced8e819b0300c56748b61c563326fdeca0279242fc

    • SSDEEP

      786432:rcKwW847XzcY876oBBrW88vWBGeaRAqrT:rcBWFXE7hBB77UeayWT

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks