General

  • Target

    clickhere.exe

  • Size

    77.7MB

  • Sample

    241029-rkp7xswdkj

  • MD5

    84ca6f68e61d01fa60572a609c30c171

  • SHA1

    fa7a20b857df9c005a72b70fdc20dcedeb101d89

  • SHA256

    58778898bf34913a01105b8aa8936cb4256d45119465347b50a04dd61a63d5bf

  • SHA512

    cac65ee3f4680688815aea42deed4d65bd1d9ec29f3795b27c16263fbf35a6100eea22b4aedc86b45351737675fd8e3c10c783b99438f9dd5b18ce0162491826

  • SSDEEP

    1572864:G1lvxWIgH0hSk8IpG7V+VPhqQdSTE7/lhfLiYweyJulZUdgzXGfn0HZvkOwI:G1zzggSkB05awkSkLMpuHX1kOZ

Malware Config

Targets

    • Target

      clickhere.exe

    • Size

      77.7MB

    • MD5

      84ca6f68e61d01fa60572a609c30c171

    • SHA1

      fa7a20b857df9c005a72b70fdc20dcedeb101d89

    • SHA256

      58778898bf34913a01105b8aa8936cb4256d45119465347b50a04dd61a63d5bf

    • SHA512

      cac65ee3f4680688815aea42deed4d65bd1d9ec29f3795b27c16263fbf35a6100eea22b4aedc86b45351737675fd8e3c10c783b99438f9dd5b18ce0162491826

    • SSDEEP

      1572864:G1lvxWIgH0hSk8IpG7V+VPhqQdSTE7/lhfLiYweyJulZUdgzXGfn0HZvkOwI:G1zzggSkB05awkSkLMpuHX1kOZ

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks