General

  • Target

    source_prepared.exe

  • Size

    103.0MB

  • Sample

    241212-hgp83stlgv

  • MD5

    d6024e3b43a11250ea105e975d7ab90a

  • SHA1

    362587f33c4d34bd9af02330ce4c7de000f6d8f3

  • SHA256

    22a0f6f7b8b71307e74039166444e12f6e243cd8fe3a879b2981cb9f59dbe318

  • SHA512

    68591548c5e07f05dc819425d8ab3dbbcbbddd0968d2dbbee19d9fe3a0b32dfe218a27c9f68b8f343cbf910ea75ac200102939869a852e26b56214bdc0a82b98

  • SSDEEP

    3145728:wAjCRrS6xjKcBanL2qHO5iV0fnGQbRe0zJcBLjZ2:zeZSWNaBHCiu1XcB0

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      103.0MB

    • MD5

      d6024e3b43a11250ea105e975d7ab90a

    • SHA1

      362587f33c4d34bd9af02330ce4c7de000f6d8f3

    • SHA256

      22a0f6f7b8b71307e74039166444e12f6e243cd8fe3a879b2981cb9f59dbe318

    • SHA512

      68591548c5e07f05dc819425d8ab3dbbcbbddd0968d2dbbee19d9fe3a0b32dfe218a27c9f68b8f343cbf910ea75ac200102939869a852e26b56214bdc0a82b98

    • SSDEEP

      3145728:wAjCRrS6xjKcBanL2qHO5iV0fnGQbRe0zJcBLjZ2:zeZSWNaBHCiu1XcB0

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks