General

  • Target

    Plague.ccCRACKED.exe

  • Size

    77.4MB

  • Sample

    241201-rlbqxstkbw

  • MD5

    5364f6f7b36e3420309850e1d41308da

  • SHA1

    4109c528d852dd1df50531aed1fa0d381bd74f72

  • SHA256

    ac46f144e6b2d33761db73fbff347eb33c6e070f04439a779e94968726ebaccd

  • SHA512

    a238cf1826f35135706e4684675d52d3241e3254165760916e05e6683a5b04ae08ed7442ae571b1505e7bf80eb6c54115aa7e9be6665a2184eee985714e4e24c

  • SSDEEP

    1572864:S1l2WUmUSk8IpG7V+VPhqFxE7Hlh8qAiYweyJulZUdgg4D/KUpd72:S1sHmUSkB05awFeLrpus4LtZ2

Malware Config

Targets

    • Target

      Plague.ccCRACKED.exe

    • Size

      77.4MB

    • MD5

      5364f6f7b36e3420309850e1d41308da

    • SHA1

      4109c528d852dd1df50531aed1fa0d381bd74f72

    • SHA256

      ac46f144e6b2d33761db73fbff347eb33c6e070f04439a779e94968726ebaccd

    • SHA512

      a238cf1826f35135706e4684675d52d3241e3254165760916e05e6683a5b04ae08ed7442ae571b1505e7bf80eb6c54115aa7e9be6665a2184eee985714e4e24c

    • SSDEEP

      1572864:S1l2WUmUSk8IpG7V+VPhqFxE7Hlh8qAiYweyJulZUdgg4D/KUpd72:S1sHmUSkB05awFeLrpus4LtZ2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks