Resubmissions

19-10-2024 05:09

241019-ftdppsyfre 10

19-10-2024 03:13

241019-dqzfwstepa 10

19-10-2024 03:08

241019-dnezgawbmk 10

19-10-2024 03:03

241019-dj3vqstbqe 10

General

  • Target

    source_prepared.exe

  • Size

    102.9MB

  • Sample

    241019-dqzfwstepa

  • MD5

    55b3f067577169e8f69c40ed6169af7c

  • SHA1

    d39e828b4eecdaafbcc331eb5f82829f85e902c6

  • SHA256

    e503ecf3527bfc5b2d734b5ac58fd1d740726e554d5b3fa1a5fb53fe27e1ffaa

  • SHA512

    989678d8076c3beb138286dd921066ee845372f21eb57259f5f0aee7c33ced17b7954d8b1d4f04f37293e437e828b0921fc36c3478eae8d018090f99998e3b20

  • SSDEEP

    3145728:jnG9r78S6xjKcBanL2qHO5iVAunGQbRe0zJcBC6Z2:i1ASWNaBHCin1XcBu

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      102.9MB

    • MD5

      55b3f067577169e8f69c40ed6169af7c

    • SHA1

      d39e828b4eecdaafbcc331eb5f82829f85e902c6

    • SHA256

      e503ecf3527bfc5b2d734b5ac58fd1d740726e554d5b3fa1a5fb53fe27e1ffaa

    • SHA512

      989678d8076c3beb138286dd921066ee845372f21eb57259f5f0aee7c33ced17b7954d8b1d4f04f37293e437e828b0921fc36c3478eae8d018090f99998e3b20

    • SSDEEP

      3145728:jnG9r78S6xjKcBanL2qHO5iVAunGQbRe0zJcBC6Z2:i1ASWNaBHCin1XcBu

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks