Resubmissions

13-11-2024 12:24

241113-pldt6s1nbt 10

13-11-2024 12:22

241113-pjvpxavngj 10

General

  • Target

    ADbypasser.exe

  • Size

    81.1MB

  • Sample

    241113-pjvpxavngj

  • MD5

    3da1c82c5b450c9d7fd995fc3fff88f5

  • SHA1

    47e8ce5aa9e54d1bc6d49afd4305825d837f5225

  • SHA256

    680cca1f085534eb40b22c3ba1588ca67c32d717be3ba41a5d7566faf4245511

  • SHA512

    3349faaa4039cc81dc1ff108ff921a33de6255c8be45e2288b92f02d65772b51ca515faac0f9648a70d14cf2336eea004925530be3fe1f863b414f24ca9eef3a

  • SSDEEP

    1572864:EOGKlEWpk0hSk8IpG7V+VPhqYdfmE7cliwiYgj+h58sMwiYBYpXiiD:2Kew9SkB05awcf0wy5eYB

Malware Config

Targets

    • Target

      ADbypasser.exe

    • Size

      81.1MB

    • MD5

      3da1c82c5b450c9d7fd995fc3fff88f5

    • SHA1

      47e8ce5aa9e54d1bc6d49afd4305825d837f5225

    • SHA256

      680cca1f085534eb40b22c3ba1588ca67c32d717be3ba41a5d7566faf4245511

    • SHA512

      3349faaa4039cc81dc1ff108ff921a33de6255c8be45e2288b92f02d65772b51ca515faac0f9648a70d14cf2336eea004925530be3fe1f863b414f24ca9eef3a

    • SSDEEP

      1572864:EOGKlEWpk0hSk8IpG7V+VPhqYdfmE7cliwiYgj+h58sMwiYBYpXiiD:2Kew9SkB05awcf0wy5eYB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks