General

  • Target

    DupeInjecter1.20.1.exe

  • Size

    81.4MB

  • Sample

    241116-smk7esydqb

  • MD5

    25b3c4c11ab8a5d663820460604c78a7

  • SHA1

    7db82fece642c85011ce92d711fcfd83f1fedd62

  • SHA256

    b66885d7b39cad27cea3dd33f24e64cc550bea76233982dd89ce31c30702c871

  • SHA512

    7ab6b7f23ebe0225f30f9d055ab483a5c5b5fbc8fa1a2634d8eecaaf819dd4a304937a09c0cdb85c233db6d0cc3875148fa574a7362b870e1ee2301ce24f2cdf

  • SSDEEP

    1572864:DGKlgWjp0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMwuDbZcj:qKilSkB05awHAw025yH

Malware Config

Targets

    • Target

      DupeInjecter1.20.1.exe

    • Size

      81.4MB

    • MD5

      25b3c4c11ab8a5d663820460604c78a7

    • SHA1

      7db82fece642c85011ce92d711fcfd83f1fedd62

    • SHA256

      b66885d7b39cad27cea3dd33f24e64cc550bea76233982dd89ce31c30702c871

    • SHA512

      7ab6b7f23ebe0225f30f9d055ab483a5c5b5fbc8fa1a2634d8eecaaf819dd4a304937a09c0cdb85c233db6d0cc3875148fa574a7362b870e1ee2301ce24f2cdf

    • SSDEEP

      1572864:DGKlgWjp0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMwuDbZcj:qKilSkB05awHAw025yH

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks