Resubmissions

29-10-2024 19:47

241029-yhrrasxnfv 10

29-10-2024 19:15

241029-xx766aybqa 10

29-10-2024 18:03

241029-wm2qyswpdw 10

General

  • Target

    homework.exe

  • Size

    75.9MB

  • Sample

    241029-wm2qyswpdw

  • MD5

    c13c073051e361c103efae69e8d7b0d3

  • SHA1

    109794265b9d96e38d790caa565b1db2cf11cb3c

  • SHA256

    1ab3704239d08651e5c066c14e9393dbd249082906876ad68026b26adecd8d76

  • SHA512

    1a15c34e8b412c68708e19380aa4ccadd4fe2ee4e3552925f9c473fa901df7c760726a16606f8e4caff2a1c2b4dfdaceb6dd8218821bf05c5b0eea7eddb16f36

  • SSDEEP

    1572864:o8VlkIW003Sk8IpG7V+VPhqK2SE7WCmlKUiY4MHHLeqPNLtDB61Z1RTla:oKWIESkB05awK2iCmMvMHVLtFyNT

Malware Config

Targets

    • Target

      homework.exe

    • Size

      75.9MB

    • MD5

      c13c073051e361c103efae69e8d7b0d3

    • SHA1

      109794265b9d96e38d790caa565b1db2cf11cb3c

    • SHA256

      1ab3704239d08651e5c066c14e9393dbd249082906876ad68026b26adecd8d76

    • SHA512

      1a15c34e8b412c68708e19380aa4ccadd4fe2ee4e3552925f9c473fa901df7c760726a16606f8e4caff2a1c2b4dfdaceb6dd8218821bf05c5b0eea7eddb16f36

    • SSDEEP

      1572864:o8VlkIW003Sk8IpG7V+VPhqK2SE7WCmlKUiY4MHHLeqPNLtDB61Z1RTla:oKWIESkB05awK2iCmMvMHVLtFyNT

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks