General

  • Target

    loader.exe

  • Size

    80.5MB

  • Sample

    241212-fbzt8avqgn

  • MD5

    fe881c14842784ffa354d02e89ac13a0

  • SHA1

    af1eb137d94bb7817c3c76e3a53471eb303195cf

  • SHA256

    2967568046ac1194d32e3163b20e488b670072bfbeb93686ea19f3cae7c3a63e

  • SHA512

    2402dcf38100896da0cfe711aefbae06391504eea2c6d24930f27ad6244de9dba126a3b817d71d81e5d121d5153c3aa03a7abb5e64b5e2dbab4fcd38ddd334c9

  • SSDEEP

    1572864:VGKlgWjysmwSk8IpG7V+VPhqHJE70bli08iYgj+h58sMw/DuJZeT:0KijsmwSkB05awHfw025LiJ

Malware Config

Targets

    • Target

      loader.exe

    • Size

      80.5MB

    • MD5

      fe881c14842784ffa354d02e89ac13a0

    • SHA1

      af1eb137d94bb7817c3c76e3a53471eb303195cf

    • SHA256

      2967568046ac1194d32e3163b20e488b670072bfbeb93686ea19f3cae7c3a63e

    • SHA512

      2402dcf38100896da0cfe711aefbae06391504eea2c6d24930f27ad6244de9dba126a3b817d71d81e5d121d5153c3aa03a7abb5e64b5e2dbab4fcd38ddd334c9

    • SSDEEP

      1572864:VGKlgWjysmwSk8IpG7V+VPhqHJE70bli08iYgj+h58sMw/DuJZeT:0KijsmwSkB05awHfw025LiJ

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks