General

  • Target

    zen.exe

  • Size

    31.4MB

  • Sample

    241224-f9zxwasjay

  • MD5

    f27d16dab34aef4b806febdc586bbd75

  • SHA1

    cf57fd534771deba3ad1fbd7699bc21850442ae3

  • SHA256

    a458d5b82d6dc62ac7ad4e8306718bf745bfacf974a93e5c124f2d158176f45f

  • SHA512

    71181109119ea79844cc3961bf459473134d7d3442e0e098a52d59c529ff6a96b77380f76437eb72cf848a5f29b8748fb9e9c121bfb3b8531bfaf91bf21fc2c8

  • SSDEEP

    786432:i9Z9HcEbh7vDkdbZzcY876t9e7K8vCW8zlXIijPtImZ16cEE5IyLII:0vHcEbh7vQdRE7oEudW49j6uZoH

Malware Config

Targets

    • Target

      zen.exe

    • Size

      31.4MB

    • MD5

      f27d16dab34aef4b806febdc586bbd75

    • SHA1

      cf57fd534771deba3ad1fbd7699bc21850442ae3

    • SHA256

      a458d5b82d6dc62ac7ad4e8306718bf745bfacf974a93e5c124f2d158176f45f

    • SHA512

      71181109119ea79844cc3961bf459473134d7d3442e0e098a52d59c529ff6a96b77380f76437eb72cf848a5f29b8748fb9e9c121bfb3b8531bfaf91bf21fc2c8

    • SSDEEP

      786432:i9Z9HcEbh7vDkdbZzcY876t9e7K8vCW8zlXIijPtImZ16cEE5IyLII:0vHcEbh7vQdRE7oEudW49j6uZoH

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks