General

  • Target

    241112-w4hpeaydjb_pw_infected.zip

  • Size

    75.5MB

  • Sample

    241115-y5z17a1fqr

  • MD5

    f3fae7321d587719b307f9c175defa30

  • SHA1

    e34c7d12017271744743c295c718fdf393c7cc70

  • SHA256

    85c11e87a25190d19b4952d5e871a78d4cce08981f359bfdc443b5e816dacba7

  • SHA512

    c606c62e59d0619da7963622c184ed9ea46a8f09456329e3160252fc8ee66ab882175f52d65e63af3a2324dc4587303077aeb4575f8113ff5e3a01d76a6f7410

  • SSDEEP

    1572864:Jtwb/wrnwLC4f9+f/xSBep8xi5UbxfiGyyN3uulOqrN97rmf:JWsTuC4l+f/xSlxi5UVKX4hl1PO

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      75.8MB

    • MD5

      8e5dcc8bf2b4cdf2a32c3e868413d067

    • SHA1

      203007aa869ec6dc86b049d5b3ef0c481a5ee209

    • SHA256

      21fdeda30f9767f823c2264660392b0f5a85e8b337b6907c2e0031ad1cb22d80

    • SHA512

      6c6a479a95d6956543b8754101ca6ca70b8ec72a3df865bd4c8eed9e48998b7199bd80b62da137a24101ebc4b56b79042927ecef5c615e7c87029d4a6c0784ba

    • SSDEEP

      1572864:b8VlCW/O03Sk8IpG7V+VPhqIUE7WCylKtFiY4MHHLeqPNLtDamgnnZU8Mp3:bKEsFSkB05awIACyMoMHVLtemmnfMZ

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks