General

  • Target

    source_prepared.exe

  • Size

    76.9MB

  • Sample

    241116-tcfdvsyjdx

  • MD5

    742ee314864ac4c23764dda72db39cb9

  • SHA1

    6387d8c4d91b34427cea2092323e28e12d0692c9

  • SHA256

    ec61c3d4b1b52f79f499d1532d55968ee79ab1cf72b598537fcecff29ea08d0e

  • SHA512

    dc5cf7ee46a16ecdf7b7ea76a318c50e1fc4a230c3974fcd9f61495c1975b72a6f7ecbae936156cb2cd6635a7c2e090c38b76602cb447ead961bcfeefa1be701

  • SSDEEP

    1572864:V1l2W/0hSk8IpG7V+VPhqFxE7Hlh8qAiYweyJulZUdgg4Z0e4pd72:V1szSkB05awFeLrpus4+RZ2

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      76.9MB

    • MD5

      742ee314864ac4c23764dda72db39cb9

    • SHA1

      6387d8c4d91b34427cea2092323e28e12d0692c9

    • SHA256

      ec61c3d4b1b52f79f499d1532d55968ee79ab1cf72b598537fcecff29ea08d0e

    • SHA512

      dc5cf7ee46a16ecdf7b7ea76a318c50e1fc4a230c3974fcd9f61495c1975b72a6f7ecbae936156cb2cd6635a7c2e090c38b76602cb447ead961bcfeefa1be701

    • SSDEEP

      1572864:V1l2W/0hSk8IpG7V+VPhqFxE7Hlh8qAiYweyJulZUdgg4Z0e4pd72:V1szSkB05awFeLrpus4+RZ2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks