General

  • Target

    DupeInjecterV2.exe

  • Size

    81.4MB

  • Sample

    241111-tpvz3szpcw

  • MD5

    05352e7edff4ae6519d710dd9e0d7af4

  • SHA1

    534c485e6b3f1eb8cebf52fe3b869f44674ce0a5

  • SHA256

    dba8f5b4208d6a170bbfe6d565ab2d541f20fb0a3f131da60ea02d3fad9fc871

  • SHA512

    5fd768e97aaa2ff2278cb728afc36403f283c64ffe8a314142a9fb2a347a8581fcfb1c6cfb87b3e4a48f11ee52b6a11e16b234ebc03e0d7771aba856866f11b1

  • SSDEEP

    1572864:vGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:uKibZSkB05awHAw025c7

Malware Config

Targets

    • Target

      DupeInjecterV2.exe

    • Size

      81.4MB

    • MD5

      05352e7edff4ae6519d710dd9e0d7af4

    • SHA1

      534c485e6b3f1eb8cebf52fe3b869f44674ce0a5

    • SHA256

      dba8f5b4208d6a170bbfe6d565ab2d541f20fb0a3f131da60ea02d3fad9fc871

    • SHA512

      5fd768e97aaa2ff2278cb728afc36403f283c64ffe8a314142a9fb2a347a8581fcfb1c6cfb87b3e4a48f11ee52b6a11e16b234ebc03e0d7771aba856866f11b1

    • SSDEEP

      1572864:vGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:uKibZSkB05awHAw025c7

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks