General

  • Target

    Password - 123.rar

  • Size

    78.0MB

  • Sample

    241105-yclm4axbja

  • MD5

    0f391119d689a5a40fe89ce4b9362978

  • SHA1

    524da704c241e89e0ee366c65b86889a05c8c6de

  • SHA256

    2994940aecec84087c70f40c80af2b1f452ab9990462982f5ce04ba7d182ff0f

  • SHA512

    5a9fc2b6ef4f35011abed86405f916a4033345fc5951342d41ccb540bc6c20104c33fb9ca90fa3b4bc85cfa7d80b3e23a360865c9914c9698551bc1c1798dd2d

  • SSDEEP

    1572864:X4u+RwAMnb1u6R6zlPjUgopMiAOyR2ymHZ46b0G7x:r++Ru6R6+MhRR27HXb0a

Malware Config

Targets

    • Target

      Tester/source_prepared.exe

    • Size

      81.0MB

    • MD5

      230fd80697a343758f1c92fdc5b7e6af

    • SHA1

      fad474242d2218c1d82972827e86e904c9ed605f

    • SHA256

      b2deb8269ae3d91be9441dcfa7d835223f5b71690122a263305b5a8264b2fab6

    • SHA512

      9c35ccc417ec497363e57081265c4b35e4b3a85eace78259234b874bc0a89b941fad6cf872c826689ec6390e61bc075177f27c0e445b2c117ed080287ca03085

    • SSDEEP

      1572864:zGKlfWlJ0hSk8IpG7V+VPhqO+ynE77lizHiYgj+h58sMw6erlpIT/cJFgs:6KxEaSkB05awO+yYwV5eerQag

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks