General

  • Target

    DupeInjecterV2.exe

  • Size

    81.4MB

  • Sample

    241111-yfap1avekb

  • MD5

    6506b0fc4cc2d1f0d981e1a35cea7740

  • SHA1

    7ba69731f06a808f56efa64b7713148ab2fc229f

  • SHA256

    5cd35294656913281597819a61b4edce4669f266006bdf0817045cd4e11a1a25

  • SHA512

    e2b6e4f6974cbb4fe0c50dd9810f75a58d45a844db6234dd4067fab46561f1a466eb8b544fcc2750838fc58ba19ba2c66cbe1188253431f9abddd2bb5dad05ad

  • SSDEEP

    1572864:/GKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:eKibZSkB05awHAw025c7

Malware Config

Targets

    • Target

      DupeInjecterV2.exe

    • Size

      81.4MB

    • MD5

      6506b0fc4cc2d1f0d981e1a35cea7740

    • SHA1

      7ba69731f06a808f56efa64b7713148ab2fc229f

    • SHA256

      5cd35294656913281597819a61b4edce4669f266006bdf0817045cd4e11a1a25

    • SHA512

      e2b6e4f6974cbb4fe0c50dd9810f75a58d45a844db6234dd4067fab46561f1a466eb8b544fcc2750838fc58ba19ba2c66cbe1188253431f9abddd2bb5dad05ad

    • SSDEEP

      1572864:/GKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:eKibZSkB05awHAw025c7

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks