General
-
Target
source_prepared.exe
-
Size
52.2MB
-
Sample
241027-r41srszapm
-
MD5
76c3e9ee1995b589668d852d3550510a
-
SHA1
36b2e2ccc9b3bb18296ddd4cf1828896e175b034
-
SHA256
cad156fac1dab9b339fbb8065bff7f13c038b3bae52f155dbc67f76533ea497b
-
SHA512
1d09e63cd95b51b6cec1f8df7b7170b58ab1dce3ba149fe5bb9e653ede38424fa1e1bc5061619fb369d0526cefb39d4ab7128ab7e1ef49550ce55aac3b113637
-
SSDEEP
1572864:NE1l/WhS0hSk8IpG7V+VPhqYdfzE7gFlhqH345vyyH:NE1RISkB05awcftLQ3Z
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
52.2MB
-
MD5
76c3e9ee1995b589668d852d3550510a
-
SHA1
36b2e2ccc9b3bb18296ddd4cf1828896e175b034
-
SHA256
cad156fac1dab9b339fbb8065bff7f13c038b3bae52f155dbc67f76533ea497b
-
SHA512
1d09e63cd95b51b6cec1f8df7b7170b58ab1dce3ba149fe5bb9e653ede38424fa1e1bc5061619fb369d0526cefb39d4ab7128ab7e1ef49550ce55aac3b113637
-
SSDEEP
1572864:NE1l/WhS0hSk8IpG7V+VPhqYdfzE7gFlhqH345vyyH:NE1RISkB05awcftLQ3Z
-
Enumerates VirtualBox DLL files
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1