General

  • Target

    Loader.exe

  • Size

    51.8MB

  • Sample

    241030-k4lwaa1pgk

  • MD5

    c5b2e4da1da9736cc6b4e59207727778

  • SHA1

    7c9b97a7814ccca5b2699a5dc419cff1eb3080e8

  • SHA256

    16ca3306e1796a91cfc47d4a8a36a82740ef8ef1e5944ee7ade4ad21a32cf6ce

  • SHA512

    3ae8ceb64d30aeaab1f88b31a90f0227dc3b2992709b96ebe5763d66d622c4c2a6596ffd0f4f53170b330eef7a580ed854f07774f4cd4be7b590d99076234dea

  • SSDEEP

    1572864:tvHcRlV9zSk8IpG7V+VPhqWdfME7FFlHFudW4lsuxlc:tvHcRhSkB05awqfhd0dRn

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      51.8MB

    • MD5

      c5b2e4da1da9736cc6b4e59207727778

    • SHA1

      7c9b97a7814ccca5b2699a5dc419cff1eb3080e8

    • SHA256

      16ca3306e1796a91cfc47d4a8a36a82740ef8ef1e5944ee7ade4ad21a32cf6ce

    • SHA512

      3ae8ceb64d30aeaab1f88b31a90f0227dc3b2992709b96ebe5763d66d622c4c2a6596ffd0f4f53170b330eef7a580ed854f07774f4cd4be7b590d99076234dea

    • SSDEEP

      1572864:tvHcRlV9zSk8IpG7V+VPhqWdfME7FFlHFudW4lsuxlc:tvHcRhSkB05awqfhd0dRn

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks