General

  • Target

    $RDDKRF0.exe

  • Size

    76.8MB

  • Sample

    241210-efhk3asre1

  • MD5

    4a06d4abd4e05eaed76afe296fd5df01

  • SHA1

    51921b6d814044b00cc4bc9dd04a76eee840071c

  • SHA256

    24362ff6a324800a9cdea2d023dfbe4f21b195c4ea3ad51c4dc9c9cfecdf4c87

  • SHA512

    e70fec831ba539796460f7c05f39f1f239921310854872aeaaf171c6542cbc090fa8ebe14ffe379698b12d4270b3cfb1920e65d9c3dfb8de8e90f48319fcfdd5

  • SSDEEP

    1572864:h41lfWMHmUSk8IpG7V+VPhqYdfzE7xFlhq4iYweyJulZUdgM34iRybL/Z9Ui:h41F7mUSkB05awcfSLypuQ3qh9U

Malware Config

Targets

    • Target

      $RDDKRF0.exe

    • Size

      76.8MB

    • MD5

      4a06d4abd4e05eaed76afe296fd5df01

    • SHA1

      51921b6d814044b00cc4bc9dd04a76eee840071c

    • SHA256

      24362ff6a324800a9cdea2d023dfbe4f21b195c4ea3ad51c4dc9c9cfecdf4c87

    • SHA512

      e70fec831ba539796460f7c05f39f1f239921310854872aeaaf171c6542cbc090fa8ebe14ffe379698b12d4270b3cfb1920e65d9c3dfb8de8e90f48319fcfdd5

    • SSDEEP

      1572864:h41lfWMHmUSk8IpG7V+VPhqYdfzE7xFlhq4iYweyJulZUdgM34iRybL/Z9Ui:h41F7mUSkB05awcfSLypuQ3qh9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks