General

  • Target

    b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb.exe

  • Size

    81.1MB

  • Sample

    241011-12yp3awgnf

  • MD5

    f7816fb09d8d8e6b166ef851678b9eb2

  • SHA1

    652a89d9f90ff200dbb3e0ca2a868a87f86f4c40

  • SHA256

    b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb

  • SHA512

    b22d019dfb72d3db8c7020901f59bc44e2c129c8f2ed099a0b56105a42f0ffc48d66ace7f80ef1d1c3f3261a822fc4fdba1d72793fe9ba36eca6237610df0512

  • SSDEEP

    1572864:uvlQ3jewiESk8IpG7V+VPhqArYE7mjCNtOWB/4PcPJKW59ObbP1g5:uvl+CTESkB05awArMu/dB/YcPsS9O3Pq

Malware Config

Targets

    • Target

      b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb.exe

    • Size

      81.1MB

    • MD5

      f7816fb09d8d8e6b166ef851678b9eb2

    • SHA1

      652a89d9f90ff200dbb3e0ca2a868a87f86f4c40

    • SHA256

      b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb

    • SHA512

      b22d019dfb72d3db8c7020901f59bc44e2c129c8f2ed099a0b56105a42f0ffc48d66ace7f80ef1d1c3f3261a822fc4fdba1d72793fe9ba36eca6237610df0512

    • SSDEEP

      1572864:uvlQ3jewiESk8IpG7V+VPhqArYE7mjCNtOWB/4PcPJKW59ObbP1g5:uvl+CTESkB05awArMu/dB/YcPsS9O3Pq

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks