General
-
Target
source_prepared.exe
-
Size
75.8MB
-
Sample
241226-1aeg4s1lhj
-
MD5
0e1c72414ad1c1ed16f44efdda142ba1
-
SHA1
f61bb58f8df8d87b345acfbbbf14977984093969
-
SHA256
2cca41393d5b52cdd1e5f31c630efb86ede2e825013d9ce044b4a4e9ebffcb5b
-
SHA512
b361933c68eb9646aeab212fd1c165ad7b942d6022f3bc0f8e5eb80cd925b0209c125bd41380ca99bb414c2de18aa87ff2939abf23eac198bb35628e1b4e8373
-
SSDEEP
1572864:A8Vl1xWYomcSk8IpG7V+VPhqIUE7WSlKiRiY4MHHLeqPNLtDYbNjZ6BqD:AKdPomcSkB05awIASMiOMHVLtUbNjg
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
75.8MB
-
MD5
0e1c72414ad1c1ed16f44efdda142ba1
-
SHA1
f61bb58f8df8d87b345acfbbbf14977984093969
-
SHA256
2cca41393d5b52cdd1e5f31c630efb86ede2e825013d9ce044b4a4e9ebffcb5b
-
SHA512
b361933c68eb9646aeab212fd1c165ad7b942d6022f3bc0f8e5eb80cd925b0209c125bd41380ca99bb414c2de18aa87ff2939abf23eac198bb35628e1b4e8373
-
SSDEEP
1572864:A8Vl1xWYomcSk8IpG7V+VPhqIUE7WSlKiRiY4MHHLeqPNLtDYbNjZ6BqD:AKdPomcSkB05awIASMiOMHVLtUbNjg
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1