General
-
Target
RenameThisThisIsTheRAT.exe
-
Size
77.5MB
-
Sample
241110-lswf1svcmh
-
MD5
f327e91dd3f1507f075d435231c84f5e
-
SHA1
4b4726e2819170b08915de3beabf6704a7a04d96
-
SHA256
f7ed3b2a9ceffa0001302bafd62a728b3462e251371be232df66a6881bae872a
-
SHA512
4f177cc19a2055277324a85446125343ff0f20790b5448001dc762c20c09629006c0a41e6c3b3407d12b55db7feba547aab3c1e6fe07c9968e91ee02d3ae99b7
-
SSDEEP
1572864:H1lVW950hSk8IpG7V+VPhqFxE7LlhpBB8iYweyJulZUdgP7Xip5+vMTzqvCZH1O3:H1bWySkB05awFeLpnNpur71vMXRrO3
Behavioral task
behavioral1
Sample
RenameThisThisIsTheRAT.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RenameThisThisIsTheRAT.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
RenameThisThisIsTheRAT.exe
-
Size
77.5MB
-
MD5
f327e91dd3f1507f075d435231c84f5e
-
SHA1
4b4726e2819170b08915de3beabf6704a7a04d96
-
SHA256
f7ed3b2a9ceffa0001302bafd62a728b3462e251371be232df66a6881bae872a
-
SHA512
4f177cc19a2055277324a85446125343ff0f20790b5448001dc762c20c09629006c0a41e6c3b3407d12b55db7feba547aab3c1e6fe07c9968e91ee02d3ae99b7
-
SSDEEP
1572864:H1lVW950hSk8IpG7V+VPhqFxE7LlhpBB8iYweyJulZUdgP7Xip5+vMTzqvCZH1O3:H1bWySkB05awFeLpnNpur71vMXRrO3
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1