General

  • Target

    Ddos.exe

  • Size

    77.4MB

  • Sample

    241021-nchaka1gmd

  • MD5

    2b759dcfb04fef5702ee2814dfde90d8

  • SHA1

    b76264260e10ae8e739d906381b7b64f9d456099

  • SHA256

    349fede20eee93a978b791639a0ae230876e449a37077addc73c13fa04ed01ac

  • SHA512

    c61fd48115c04e38364e5c2979d05580d1a750b885e50228e0f1f59f1a7dbf6d3d3bb24619b6fe6fd1aacf0288d14945fa1f5995156fe187f746a66f0ff0c2bc

  • SSDEEP

    1572864:+1l9Wd30ASk8IpG7V+VPhqYdfzE7ElhTRiYweyJulZUdgkhe40jSlV3mDV:+1HkSkB05awcfHLapuQhyMqV

Malware Config

Targets

    • Target

      Ddos.exe

    • Size

      77.4MB

    • MD5

      2b759dcfb04fef5702ee2814dfde90d8

    • SHA1

      b76264260e10ae8e739d906381b7b64f9d456099

    • SHA256

      349fede20eee93a978b791639a0ae230876e449a37077addc73c13fa04ed01ac

    • SHA512

      c61fd48115c04e38364e5c2979d05580d1a750b885e50228e0f1f59f1a7dbf6d3d3bb24619b6fe6fd1aacf0288d14945fa1f5995156fe187f746a66f0ff0c2bc

    • SSDEEP

      1572864:+1l9Wd30ASk8IpG7V+VPhqYdfzE7ElhTRiYweyJulZUdgkhe40jSlV3mDV:+1HkSkB05awcfHLapuQhyMqV

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks