General

  • Target

    AdobeDC.exe

  • Size

    45.9MB

  • Sample

    241125-2anw8azjdx

  • MD5

    a6440f6546f7f182d409a7bdd4d598d7

  • SHA1

    9cf1957557bd026a1553c363ecf347dabfbfe4d3

  • SHA256

    e53fdaa8a38620b11936360c960bae53174d91bae90be97e9350c352f90371cd

  • SHA512

    65440511cf4ef6c01ffdc83ea1d70b9feaeb5b16a85012eff5e80c14621cc50049e8501fae70e83598e203a110c448c9ddb3a6ab631202cbea9bb841c3ab567f

  • SSDEEP

    786432:d3Vl8Z2tatAj52dkg/IpG7VB8VPhq7EOmWzcY87hLHZrO7RcuFsMRXXg:a2q05Sk8IpG7V+VPhq7E32E79AcubRXX

Malware Config

Targets

    • Target

      AdobeDC.exe

    • Size

      45.9MB

    • MD5

      a6440f6546f7f182d409a7bdd4d598d7

    • SHA1

      9cf1957557bd026a1553c363ecf347dabfbfe4d3

    • SHA256

      e53fdaa8a38620b11936360c960bae53174d91bae90be97e9350c352f90371cd

    • SHA512

      65440511cf4ef6c01ffdc83ea1d70b9feaeb5b16a85012eff5e80c14621cc50049e8501fae70e83598e203a110c448c9ddb3a6ab631202cbea9bb841c3ab567f

    • SSDEEP

      786432:d3Vl8Z2tatAj52dkg/IpG7VB8VPhq7EOmWzcY87hLHZrO7RcuFsMRXXg:a2q05Sk8IpG7V+VPhq7E32E79AcubRXX

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks