General

  • Target

    RustBypass.exe

  • Size

    75.4MB

  • Sample

    241129-sd947a1qgs

  • MD5

    91e4e0fa83452af2bf5aad90289f1ef9

  • SHA1

    9e97b506aa9f5e3cc06c87ba63acc2ac56d43cfe

  • SHA256

    e1999be21a2a9ea34886bac057ff95492abee2d52d0bf75029d24e877918bddb

  • SHA512

    dc0c188cf8302097b9ea0578000dba4dfc96b17b89f7c498c27a592107313ac71107f1173a6cd029fe502977e3c8f5a9d3fb0202ef762d76fb4f1852d989d12f

  • SSDEEP

    1572864:p1lLWboSk8IpG7V+VPhqqxE7LlhpBB8iYweyJulZUdgP75oCizwvJZH1O3:p1BaoSkB05awqeLpnNpur7GC0+rO3

Malware Config

Targets

    • Target

      RustBypass.exe

    • Size

      75.4MB

    • MD5

      91e4e0fa83452af2bf5aad90289f1ef9

    • SHA1

      9e97b506aa9f5e3cc06c87ba63acc2ac56d43cfe

    • SHA256

      e1999be21a2a9ea34886bac057ff95492abee2d52d0bf75029d24e877918bddb

    • SHA512

      dc0c188cf8302097b9ea0578000dba4dfc96b17b89f7c498c27a592107313ac71107f1173a6cd029fe502977e3c8f5a9d3fb0202ef762d76fb4f1852d989d12f

    • SSDEEP

      1572864:p1lLWboSk8IpG7V+VPhqqxE7LlhpBB8iYweyJulZUdgP75oCizwvJZH1O3:p1BaoSkB05awqeLpnNpur7GC0+rO3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks