General

  • Target

    Control.exe

  • Size

    76.7MB

  • Sample

    241115-w7r29ayldz

  • MD5

    8595e8c0b9c5f3dc2d1443b3cd188ea8

  • SHA1

    ff96b392dc31a92011357c1ab4ebd61e58a017cf

  • SHA256

    57b4c42dcd7a89b22494a5283df8347e433acf801b25a24a4df0b0438c50f617

  • SHA512

    de24d4eb35ea5989ddef35882bd04a72f5f4038cd7a1f4de5460205f3901cf6c2331176b6d485660ea8a8dc7323d1419b1af496a45c07870c8d094fdbd6d7f0f

  • SSDEEP

    1572864:YvlxWf0hSk8IpG7V+VPhqYdIFE7+lhzmiYweyJulZUdgsh/0rLamCV37U:YvjnSkB05awcInLfpuIh8rWVo

Malware Config

Targets

    • Target

      Control.exe

    • Size

      76.7MB

    • MD5

      8595e8c0b9c5f3dc2d1443b3cd188ea8

    • SHA1

      ff96b392dc31a92011357c1ab4ebd61e58a017cf

    • SHA256

      57b4c42dcd7a89b22494a5283df8347e433acf801b25a24a4df0b0438c50f617

    • SHA512

      de24d4eb35ea5989ddef35882bd04a72f5f4038cd7a1f4de5460205f3901cf6c2331176b6d485660ea8a8dc7323d1419b1af496a45c07870c8d094fdbd6d7f0f

    • SSDEEP

      1572864:YvlxWf0hSk8IpG7V+VPhqYdIFE7+lhzmiYweyJulZUdgsh/0rLamCV37U:YvjnSkB05awcInLfpuIh8rWVo

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks