General

  • Target

    cheat.exe

  • Size

    81.1MB

  • Sample

    241208-zgfhbayncj

  • MD5

    783fa5df487f0031b2202d38cbee6357

  • SHA1

    294cb588b520ef073ae92dd24c7602c2568e3870

  • SHA256

    0ba47470933107eb96d79fbfaf0bb5f8e59f8d330d38c54b65bb44a5b28415d8

  • SHA512

    c29a90faa269751676e9b8f3b768db34bbc303aadb9420e51a83567f75ee8647614656910910e1a44ad260971510b06d99a096bed41d9e5ef7ecf80fc2ae9adc

  • SSDEEP

    1572864:CGKlXOUWtMmpSk8IpG7V+VPhqO+ynE7qliJiYgj+h58sMwIIXerWhH/cJFJ:LKRdWMmpSkB05awO+y5wL5kmer4eJ

Malware Config

Targets

    • Target

      cheat.exe

    • Size

      81.1MB

    • MD5

      783fa5df487f0031b2202d38cbee6357

    • SHA1

      294cb588b520ef073ae92dd24c7602c2568e3870

    • SHA256

      0ba47470933107eb96d79fbfaf0bb5f8e59f8d330d38c54b65bb44a5b28415d8

    • SHA512

      c29a90faa269751676e9b8f3b768db34bbc303aadb9420e51a83567f75ee8647614656910910e1a44ad260971510b06d99a096bed41d9e5ef7ecf80fc2ae9adc

    • SSDEEP

      1572864:CGKlXOUWtMmpSk8IpG7V+VPhqO+ynE7qliJiYgj+h58sMwIIXerWhH/cJFJ:LKRdWMmpSkB05awO+y5wL5kmer4eJ

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks