General

  • Target

    Lexor.exe

  • Size

    76.8MB

  • Sample

    241111-vlbmps1lft

  • MD5

    3c7d5a1ed6a37845eb0516c1bc90a638

  • SHA1

    2ed4309a62b6cef2217b2c2ebc741aa0ecdc941c

  • SHA256

    dc0ef149a815688e93d6eddcdc659ef6616dece29a1e73000d41d63e6e5adb31

  • SHA512

    2ec57349c406169b58fd930ccee57023e854218f475fe0434227f5e09614dda5980ac6dbeb5bdec19b35ce9147006b44b4263f0a6a2149434305020262cfaf40

  • SSDEEP

    1572864:7j1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7nivMazqvCZH1O3:7j1AOoSkB05awO6L+nupuu7ivMsRrO3

Malware Config

Targets

    • Target

      Lexor.exe

    • Size

      76.8MB

    • MD5

      3c7d5a1ed6a37845eb0516c1bc90a638

    • SHA1

      2ed4309a62b6cef2217b2c2ebc741aa0ecdc941c

    • SHA256

      dc0ef149a815688e93d6eddcdc659ef6616dece29a1e73000d41d63e6e5adb31

    • SHA512

      2ec57349c406169b58fd930ccee57023e854218f475fe0434227f5e09614dda5980ac6dbeb5bdec19b35ce9147006b44b4263f0a6a2149434305020262cfaf40

    • SSDEEP

      1572864:7j1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7nivMazqvCZH1O3:7j1AOoSkB05awO6L+nupuu7ivMsRrO3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks