General
-
Target
DupeInjecterV2.exe
-
Size
81.4MB
-
Sample
241111-tpvz3szpcw
-
MD5
05352e7edff4ae6519d710dd9e0d7af4
-
SHA1
534c485e6b3f1eb8cebf52fe3b869f44674ce0a5
-
SHA256
dba8f5b4208d6a170bbfe6d565ab2d541f20fb0a3f131da60ea02d3fad9fc871
-
SHA512
5fd768e97aaa2ff2278cb728afc36403f283c64ffe8a314142a9fb2a347a8581fcfb1c6cfb87b3e4a48f11ee52b6a11e16b234ebc03e0d7771aba856866f11b1
-
SSDEEP
1572864:vGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:uKibZSkB05awHAw025c7
Malware Config
Targets
-
-
Target
DupeInjecterV2.exe
-
Size
81.4MB
-
MD5
05352e7edff4ae6519d710dd9e0d7af4
-
SHA1
534c485e6b3f1eb8cebf52fe3b869f44674ce0a5
-
SHA256
dba8f5b4208d6a170bbfe6d565ab2d541f20fb0a3f131da60ea02d3fad9fc871
-
SHA512
5fd768e97aaa2ff2278cb728afc36403f283c64ffe8a314142a9fb2a347a8581fcfb1c6cfb87b3e4a48f11ee52b6a11e16b234ebc03e0d7771aba856866f11b1
-
SSDEEP
1572864:vGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:uKibZSkB05awHAw025c7
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1