General

  • Target

    source_prepared.exe

  • Size

    107.4MB

  • Sample

    241128-t34jdasrht

  • MD5

    80e5d9c1221d6b5ce966a9d0222f23f6

  • SHA1

    566711ce9b8ca26bf7cdd3ce6388acd6d49eef1b

  • SHA256

    110507cf41b6395daff3643e012339044d04a5c6989f01080ecd521403795aaf

  • SHA512

    e3ab1681c9a2f49d315686cb774a9a09dc7dd78f1348b4f8c9fe3f6809013ebc925201b5d8b7caa402e95c2515577dbd4eda4d99b3a9a0ad518e41440aa1663c

  • SSDEEP

    3145728:bU5eCRRS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQQyUOL:A5JjSWNa6NHCibhieB/

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      107.4MB

    • MD5

      80e5d9c1221d6b5ce966a9d0222f23f6

    • SHA1

      566711ce9b8ca26bf7cdd3ce6388acd6d49eef1b

    • SHA256

      110507cf41b6395daff3643e012339044d04a5c6989f01080ecd521403795aaf

    • SHA512

      e3ab1681c9a2f49d315686cb774a9a09dc7dd78f1348b4f8c9fe3f6809013ebc925201b5d8b7caa402e95c2515577dbd4eda4d99b3a9a0ad518e41440aa1663c

    • SSDEEP

      3145728:bU5eCRRS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQQyUOL:A5JjSWNa6NHCibhieB/

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks