Resubmissions

17-12-2024 03:24

241217-dya39szncj 10

17-12-2024 01:52

241217-caldnawqes 10

General

  • Target

    noifyy.exe

  • Size

    103.1MB

  • Sample

    241217-caldnawqes

  • MD5

    522023d46f4653ca5f8bde2dcc74d3f9

  • SHA1

    80499fdeb25a0bcff815e1bffdd3bcac1bc654f1

  • SHA256

    b86dfa689d1acc6652361e3b3f86d61839f859201d625f5c8d6ccbe21538ddd8

  • SHA512

    c47e497b68a4803d52767dc35ff6d4d2ef9d5c2ce62be8612edfe735a0b3da0a688d0940c51f5b8f27e87435bb14d6fbc3da41ee85cfffa9fd5aa69f5e11ae5d

  • SSDEEP

    3145728:KGJCRrS6xjKcBa6V2qHO5iV2s6VnGQbRe0zJcBl59U:HsZSWNa6THCiFW1XcBl5

Malware Config

Targets

    • Target

      noifyy.exe

    • Size

      103.1MB

    • MD5

      522023d46f4653ca5f8bde2dcc74d3f9

    • SHA1

      80499fdeb25a0bcff815e1bffdd3bcac1bc654f1

    • SHA256

      b86dfa689d1acc6652361e3b3f86d61839f859201d625f5c8d6ccbe21538ddd8

    • SHA512

      c47e497b68a4803d52767dc35ff6d4d2ef9d5c2ce62be8612edfe735a0b3da0a688d0940c51f5b8f27e87435bb14d6fbc3da41ee85cfffa9fd5aa69f5e11ae5d

    • SSDEEP

      3145728:KGJCRrS6xjKcBa6V2qHO5iV2s6VnGQbRe0zJcBl59U:HsZSWNa6THCiFW1XcBl5

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks