General

  • Target

    loader.exe

  • Size

    75.2MB

  • Sample

    241202-f1qmvawran

  • MD5

    47cf06f0d2aabda71164f09043d5a66c

  • SHA1

    cfc48b677f56360310edfcbcf9beb26aefa7da44

  • SHA256

    23528e9b095b6c54ed26bc6dee84cccfd37b90ccb5187781e3442adedb5cf46e

  • SHA512

    a42da2551bb46c09a27a6d3f77d16201add657b7df36bd562f762dbc008da1efbe2da6d92a936cb0789cf6246244a8318882fd37c2362fabeae0315379a111d5

  • SSDEEP

    1572864:21lfWGSk8IpG7V+VPhqN+rXE7/lhqLiYweyJulZUdgJXyE/HZvkOy1:21pxSkB05awN+r8LLpuFXbkOO

Malware Config

Targets

    • Target

      loader.exe

    • Size

      75.2MB

    • MD5

      47cf06f0d2aabda71164f09043d5a66c

    • SHA1

      cfc48b677f56360310edfcbcf9beb26aefa7da44

    • SHA256

      23528e9b095b6c54ed26bc6dee84cccfd37b90ccb5187781e3442adedb5cf46e

    • SHA512

      a42da2551bb46c09a27a6d3f77d16201add657b7df36bd562f762dbc008da1efbe2da6d92a936cb0789cf6246244a8318882fd37c2362fabeae0315379a111d5

    • SSDEEP

      1572864:21lfWGSk8IpG7V+VPhqN+rXE7/lhqLiYweyJulZUdgJXyE/HZvkOy1:21pxSkB05awN+r8LLpuFXbkOO

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks