General

  • Target

    Found-Crypto-V2.exe

  • Size

    77.6MB

  • Sample

    241009-yshalssglk

  • MD5

    b13194cd15729b6eee0b35f175c2591f

  • SHA1

    ce44a71b5a27fb53ed412c0cd97eb589682231f8

  • SHA256

    fe357d72f46022e1efc8c8a88437bb4fb9fbf81830997db48d6f7a869985e606

  • SHA512

    b3903c5f4e62bd6ef6a40dd9ad91bc0b49dac224abc03eb0524f961082a5a610bce9f3a0fe28279b3626b9ed038aff36e4f359c973ebde9e75946e566ad562e3

  • SSDEEP

    1572864:hIvHcRl3WwmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1hKrRdETV37U:evHcR5RmSkB05awcf2LVpuxhKrD4o

Malware Config

Targets

    • Target

      Found-Crypto-V2.exe

    • Size

      77.6MB

    • MD5

      b13194cd15729b6eee0b35f175c2591f

    • SHA1

      ce44a71b5a27fb53ed412c0cd97eb589682231f8

    • SHA256

      fe357d72f46022e1efc8c8a88437bb4fb9fbf81830997db48d6f7a869985e606

    • SHA512

      b3903c5f4e62bd6ef6a40dd9ad91bc0b49dac224abc03eb0524f961082a5a610bce9f3a0fe28279b3626b9ed038aff36e4f359c973ebde9e75946e566ad562e3

    • SSDEEP

      1572864:hIvHcRl3WwmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1hKrRdETV37U:evHcR5RmSkB05awcf2LVpuxhKrD4o

    Score
    9/10
    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks