General

  • Target

    ANXVRC.exe

  • Size

    107.4MB

  • Sample

    241205-cb3dkayjcj

  • MD5

    8888baba2d69feaa3978476d604359b2

  • SHA1

    70ea4d617b9631cff7aa244a90e61a78ea3019c6

  • SHA256

    ce5a67c211945be4ccae4850f76efa6e41ad45de84490dc38225b293167cd86a

  • SHA512

    cbab5beabac2909d60d788626d9924d54acf12a895132e9b934a4c24bd0155121404fa9c85159d99120c1c237c91521074a091a88c98935714b4ee5c5b9c645c

  • SSDEEP

    3145728:vUWeCRRS6xjKcBa6/2qHO5ifpBnG0iWMstB2OxQ/ybOW:8WJjSWNa6NHCiRhieBp

Malware Config

Targets

    • Target

      ANXVRC.exe

    • Size

      107.4MB

    • MD5

      8888baba2d69feaa3978476d604359b2

    • SHA1

      70ea4d617b9631cff7aa244a90e61a78ea3019c6

    • SHA256

      ce5a67c211945be4ccae4850f76efa6e41ad45de84490dc38225b293167cd86a

    • SHA512

      cbab5beabac2909d60d788626d9924d54acf12a895132e9b934a4c24bd0155121404fa9c85159d99120c1c237c91521074a091a88c98935714b4ee5c5b9c645c

    • SSDEEP

      3145728:vUWeCRRS6xjKcBa6/2qHO5ifpBnG0iWMstB2OxQ/ybOW:8WJjSWNa6NHCiRhieBp

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks