General

  • Target

    NebulaX.exe

  • Size

    80.8MB

  • Sample

    241114-v761qs1hkn

  • MD5

    843c67d37530ff0416ce7a831a84b468

  • SHA1

    20a6996f3909723069ea7f11d8831457abec5aa6

  • SHA256

    150589300ba121635c9dceaf0659bb9195725e88d4e12a047ba53aec804bbd30

  • SHA512

    e0c03cd6a083aec07cb55d7cf6e84180687275c6d7238c0369bf4afbea70fdaff4460e9987de9c97ebeb25af896b351e35b6c0e432d9844d55182158354bf6c9

  • SSDEEP

    1572864:MGKlqWsm0hSk8IpG7V+VPhqxJE7xlictiYgj+h58sMwZerzjrFcJ5u:NKU7SkB05awxOwc35ler3Mu

Malware Config

Targets

    • Target

      NebulaX.exe

    • Size

      80.8MB

    • MD5

      843c67d37530ff0416ce7a831a84b468

    • SHA1

      20a6996f3909723069ea7f11d8831457abec5aa6

    • SHA256

      150589300ba121635c9dceaf0659bb9195725e88d4e12a047ba53aec804bbd30

    • SHA512

      e0c03cd6a083aec07cb55d7cf6e84180687275c6d7238c0369bf4afbea70fdaff4460e9987de9c97ebeb25af896b351e35b6c0e432d9844d55182158354bf6c9

    • SSDEEP

      1572864:MGKlqWsm0hSk8IpG7V+VPhqxJE7xlictiYgj+h58sMwZerzjrFcJ5u:NKU7SkB05awxOwc35ler3Mu

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks