General

  • Target

    TTSPLOIT.exe

  • Size

    76.6MB

  • Sample

    241209-v621dsvqgt

  • MD5

    54b143c1e5800018f0cd04289444e2eb

  • SHA1

    5e98471241664a146d96c5cb072c6081f6c91e23

  • SHA256

    1a7df35f784e28fc2c020afe938679002a16ff39f3e4e0a84e64e6ab45767bb8

  • SHA512

    218e555ef316a1cf3e95d007939b6e91513de4d52bc9d3ac5db6df637be23f38f00c3a2a2c3cfafd603d0c11abd45f690fc684cbb44411dfa15332c521b88bc5

  • SSDEEP

    1572864:i1lfWMHmUSk8IpG7V+VPhqYdfzE7xFlhq4iYweyJulZUdgM34jiybL/Z9Ui:i1F7mUSkB05awcfSLypuQ3gh9U

Malware Config

Targets

    • Target

      TTSPLOIT.exe

    • Size

      76.6MB

    • MD5

      54b143c1e5800018f0cd04289444e2eb

    • SHA1

      5e98471241664a146d96c5cb072c6081f6c91e23

    • SHA256

      1a7df35f784e28fc2c020afe938679002a16ff39f3e4e0a84e64e6ab45767bb8

    • SHA512

      218e555ef316a1cf3e95d007939b6e91513de4d52bc9d3ac5db6df637be23f38f00c3a2a2c3cfafd603d0c11abd45f690fc684cbb44411dfa15332c521b88bc5

    • SSDEEP

      1572864:i1lfWMHmUSk8IpG7V+VPhqYdfzE7xFlhq4iYweyJulZUdgM34jiybL/Z9Ui:i1F7mUSkB05awcfSLypuQ3gh9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks