General

  • Target

    source_prepared.exe

  • Size

    81.4MB

  • Sample

    241111-x32xbsvbne

  • MD5

    b4de351a84c48e5d85716ddba612517a

  • SHA1

    d330d4f4965194861f2fe3082b5bf046591085a2

  • SHA256

    4b4199f99836a3f0e20ed9daf3f8ec96c3893ef2ccd4d26e9669d3c5b5e6a240

  • SHA512

    fe0b6629dd328d6e20ba911c7ea805c67c992a9e4c4ab0050014894e9ae7b82ed760d70cc61b0729bbe9d6083c181daddabf2f90abc67531c41e11946f158ac4

  • SSDEEP

    1572864:aGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:DKibZSkB05awHAw025c7

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      81.4MB

    • MD5

      b4de351a84c48e5d85716ddba612517a

    • SHA1

      d330d4f4965194861f2fe3082b5bf046591085a2

    • SHA256

      4b4199f99836a3f0e20ed9daf3f8ec96c3893ef2ccd4d26e9669d3c5b5e6a240

    • SHA512

      fe0b6629dd328d6e20ba911c7ea805c67c992a9e4c4ab0050014894e9ae7b82ed760d70cc61b0729bbe9d6083c181daddabf2f90abc67531c41e11946f158ac4

    • SSDEEP

      1572864:aGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:DKibZSkB05awHAw025c7

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks