General

  • Target

    source_prepared.exe

  • Size

    107.5MB

  • Sample

    241011-pcaq6a1fje

  • MD5

    73f6e0980b3fefed364c6c0c7e6787f8

  • SHA1

    c7db42d5d1104fd2425d982369e4f338a646a697

  • SHA256

    763a7d2838bc41dee5534dddb38368a35269ea32f82bbb89ba3147261bd4d7eb

  • SHA512

    aa1bf329e04e50ead25973ee9148f19167ece507d0cb4228b457cc6dba634ede01290af3820aae779ce0cda2f2a95ac93fa79aa50dfb06be1cac164b0adf795e

  • SSDEEP

    3145728:ZN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2OxARE:/tJSWNa6NHCixiieB

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      107.5MB

    • MD5

      73f6e0980b3fefed364c6c0c7e6787f8

    • SHA1

      c7db42d5d1104fd2425d982369e4f338a646a697

    • SHA256

      763a7d2838bc41dee5534dddb38368a35269ea32f82bbb89ba3147261bd4d7eb

    • SHA512

      aa1bf329e04e50ead25973ee9148f19167ece507d0cb4228b457cc6dba634ede01290af3820aae779ce0cda2f2a95ac93fa79aa50dfb06be1cac164b0adf795e

    • SSDEEP

      3145728:ZN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2OxARE:/tJSWNa6NHCixiieB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks