General

  • Target

    jumpoutofthewindow.exe

  • Size

    81.4MB

  • Sample

    241111-ytk3wsylak

  • MD5

    c85fec31f7d94a67d35e47e592ce47b6

  • SHA1

    bd4bcf27ca5853be151bdd832e47e9b6eddb2153

  • SHA256

    58522d3f96d9943b1bf97863b746d185d0556bad0621e8d97a3737544d151826

  • SHA512

    df283d3f92ec17fb9aaa2e9cbe82a3a2ffe550a10ccf38411c642783fa5731e81888bf5817527a7cefdd9b61b6483a491313aa529317e4a048a2976fe8f225fe

  • SSDEEP

    1572864:IGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:BKibZSkB05awHAw025c7

Malware Config

Targets

    • Target

      jumpoutofthewindow.exe

    • Size

      81.4MB

    • MD5

      c85fec31f7d94a67d35e47e592ce47b6

    • SHA1

      bd4bcf27ca5853be151bdd832e47e9b6eddb2153

    • SHA256

      58522d3f96d9943b1bf97863b746d185d0556bad0621e8d97a3737544d151826

    • SHA512

      df283d3f92ec17fb9aaa2e9cbe82a3a2ffe550a10ccf38411c642783fa5731e81888bf5817527a7cefdd9b61b6483a491313aa529317e4a048a2976fe8f225fe

    • SSDEEP

      1572864:IGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:BKibZSkB05awHAw025c7

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks