General

  • Target

    Maxer.exe

  • Size

    76.8MB

  • Sample

    241111-t9wr4s1hnj

  • MD5

    f56d0c354de3277f65f62a5ab202456c

  • SHA1

    72019d84a33df8931562eeb654e289db36275224

  • SHA256

    08d96711028852c7df474034dd13542ab905597ea5f499ede2841a89dc0e9966

  • SHA512

    9beb70ffdf0174054b58361a74981b620a78ede0d87ebd8ef8630f3822ad193e7ab6e2f21fce7dd264b041ac2da29ce76a335834f9a205c53b744618d467e4ba

  • SSDEEP

    1572864:Rb1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7n+vMTzqvCZH1O3:d1AOoSkB05awO6L+nupuu7+vMXRrO3

Malware Config

Targets

    • Target

      Maxer.exe

    • Size

      76.8MB

    • MD5

      f56d0c354de3277f65f62a5ab202456c

    • SHA1

      72019d84a33df8931562eeb654e289db36275224

    • SHA256

      08d96711028852c7df474034dd13542ab905597ea5f499ede2841a89dc0e9966

    • SHA512

      9beb70ffdf0174054b58361a74981b620a78ede0d87ebd8ef8630f3822ad193e7ab6e2f21fce7dd264b041ac2da29ce76a335834f9a205c53b744618d467e4ba

    • SSDEEP

      1572864:Rb1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7n+vMTzqvCZH1O3:d1AOoSkB05awO6L+nupuu7+vMXRrO3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks