General

  • Target

    source_prepared.exe.zip

  • Size

    75.4MB

  • Sample

    241209-vgm5yazjfk

  • MD5

    fffaa8e1720e557d41227f11c44bfb3e

  • SHA1

    e0a892b6fa090dc7bbd6b98bc47302bb8a57d24d

  • SHA256

    9328ca674d654ebf6f088456309a666e390d592ebb957483759e70055078392a

  • SHA512

    dff84decfe6af8cdeb1320c9ca7402b3c063d4c7293c5eac3ca07808ef6c837b41b70e07e886564c49da597900a76cf9616e7316a0a3cbd3578447424d76be24

  • SSDEEP

    1572864:o9FlhW622ucy4Zyh/et9riPuodoCbIzZsOC1HZwUVp/BdEbUZb+GYA:oP6622ucdEt42PECMz/C13/BObUYa

Malware Config

Targets

    • Target

      source_prepared.exe.zip

    • Size

      75.4MB

    • MD5

      fffaa8e1720e557d41227f11c44bfb3e

    • SHA1

      e0a892b6fa090dc7bbd6b98bc47302bb8a57d24d

    • SHA256

      9328ca674d654ebf6f088456309a666e390d592ebb957483759e70055078392a

    • SHA512

      dff84decfe6af8cdeb1320c9ca7402b3c063d4c7293c5eac3ca07808ef6c837b41b70e07e886564c49da597900a76cf9616e7316a0a3cbd3578447424d76be24

    • SSDEEP

      1572864:o9FlhW622ucy4Zyh/et9riPuodoCbIzZsOC1HZwUVp/BdEbUZb+GYA:oP6622ucdEt42PECMz/C13/BObUYa

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks