General

  • Target

    Dupeinjecter.exe

  • Size

    81.4MB

  • Sample

    241111-tgeywszndz

  • MD5

    2ae43b357cda81e0c5e6d3b3b3c8d6c7

  • SHA1

    0f202791a3e91cfb857f458f851a4d192a27cfc2

  • SHA256

    ef9d0f0f6064b51d6cbf7578528cd525165cae6b95e76ebdd8f927f792cbfb13

  • SHA512

    b9176f50c8669fb7f399a945dfbb793b1a14a1f60b8bc3564258d07f542f61946714105330e24582c6f26c0a24cc3aefbc96170f4ed7958f5f6fce5fbfb7bb34

  • SSDEEP

    1572864:wGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:JKibZSkB05awHAw025c7

Malware Config

Targets

    • Target

      Dupeinjecter.exe

    • Size

      81.4MB

    • MD5

      2ae43b357cda81e0c5e6d3b3b3c8d6c7

    • SHA1

      0f202791a3e91cfb857f458f851a4d192a27cfc2

    • SHA256

      ef9d0f0f6064b51d6cbf7578528cd525165cae6b95e76ebdd8f927f792cbfb13

    • SHA512

      b9176f50c8669fb7f399a945dfbb793b1a14a1f60b8bc3564258d07f542f61946714105330e24582c6f26c0a24cc3aefbc96170f4ed7958f5f6fce5fbfb7bb34

    • SSDEEP

      1572864:wGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:JKibZSkB05awHAw025c7

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks