General

  • Target

    source_prepared.exe

  • Size

    103.9MB

  • Sample

    241207-da5yqssjb1

  • MD5

    98ecf03bd7eeda49dc5472572038ad33

  • SHA1

    9be2fd5cc29e1d82702ca5ca8b1031c3944e91b3

  • SHA256

    9be34f5114c5b77d57da8403133aa13ed627256967de4c9c9ae5caffb422d63f

  • SHA512

    2a36e0c9b4d83958c6e762e04fd0d9f12f017ce99f692638b473d3f34eab63c99aafcf41864e8016800f9273b2dbc0231da525199d46eb9e2a47b787766f9b56

  • SSDEEP

    3145728:yAyCRrS6xjKcBanL2qHO5iV0fnGQbRe0zJcBxJZ2:RtZSWNaBHCiu1XcBg

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      103.9MB

    • MD5

      98ecf03bd7eeda49dc5472572038ad33

    • SHA1

      9be2fd5cc29e1d82702ca5ca8b1031c3944e91b3

    • SHA256

      9be34f5114c5b77d57da8403133aa13ed627256967de4c9c9ae5caffb422d63f

    • SHA512

      2a36e0c9b4d83958c6e762e04fd0d9f12f017ce99f692638b473d3f34eab63c99aafcf41864e8016800f9273b2dbc0231da525199d46eb9e2a47b787766f9b56

    • SSDEEP

      3145728:yAyCRrS6xjKcBanL2qHO5iV0fnGQbRe0zJcBxJZ2:RtZSWNaBHCiu1XcBg

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks