General

  • Target

    spoofer.exe

  • Size

    80.7MB

  • Sample

    241125-v1bk9axqaz

  • MD5

    b915bef7cffd48dfd485d2a85791de47

  • SHA1

    1c67c73373e9cefc579db0d469142e1d517f06d6

  • SHA256

    ffbf1d7b55600e6c916539794670b7ba8bc4adfc2ecaaf969cda0835138919a1

  • SHA512

    a558c32a566e919e4dec4c4e1f654449d2cfbdba2cea9529bfa7549a693fd5a816689db20437daea3efd0e7b3e537eca72c5adb210df592f4f437cf67c867d7d

  • SSDEEP

    1572864:QPJlLWLN0RSk8IpG7V+VPhq9AE7DliriYgj+h58sMwierSipjcJ5j:EJNfSkB05aw9Zwl5eerTgj

Malware Config

Targets

    • Target

      spoofer.exe

    • Size

      80.7MB

    • MD5

      b915bef7cffd48dfd485d2a85791de47

    • SHA1

      1c67c73373e9cefc579db0d469142e1d517f06d6

    • SHA256

      ffbf1d7b55600e6c916539794670b7ba8bc4adfc2ecaaf969cda0835138919a1

    • SHA512

      a558c32a566e919e4dec4c4e1f654449d2cfbdba2cea9529bfa7549a693fd5a816689db20437daea3efd0e7b3e537eca72c5adb210df592f4f437cf67c867d7d

    • SSDEEP

      1572864:QPJlLWLN0RSk8IpG7V+VPhq9AE7DliriYgj+h58sMwierSipjcJ5j:EJNfSkB05aw9Zwl5eerTgj

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks