General

  • Target

    source_prepared.exe

  • Size

    76.9MB

  • Sample

    241019-s1xglsvgqj

  • MD5

    d9ef68f788f32aa2b44445cc258a1aed

  • SHA1

    8f96ce920b6715836e3826f5be4548a195db3b72

  • SHA256

    6af1a5fb3588c490e351b4a54371970dbd3324d916476eb26c6c1ff7cc7bea2f

  • SHA512

    8ca2fc651bcc8e8d1bfc601b754664d4bcda6e63e21a4fdf5cea3ef3c242767cb269cd86bb1a2e483078b8139cb48c88f707b238357cb8e96179bee29fbbbfd4

  • SSDEEP

    1572864:r1lfWhS0ASk8IpG7V+VPhqYdfzE7gFlhq4iYweyJulZUdgM34X5ypJ/Z9UG:r1F1SkB05awcftLypuQ3DZ9U

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      76.9MB

    • MD5

      d9ef68f788f32aa2b44445cc258a1aed

    • SHA1

      8f96ce920b6715836e3826f5be4548a195db3b72

    • SHA256

      6af1a5fb3588c490e351b4a54371970dbd3324d916476eb26c6c1ff7cc7bea2f

    • SHA512

      8ca2fc651bcc8e8d1bfc601b754664d4bcda6e63e21a4fdf5cea3ef3c242767cb269cd86bb1a2e483078b8139cb48c88f707b238357cb8e96179bee29fbbbfd4

    • SSDEEP

      1572864:r1lfWhS0ASk8IpG7V+VPhqYdfzE7gFlhq4iYweyJulZUdgM34X5ypJ/Z9UG:r1F1SkB05awcftLypuQ3DZ9U

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks