General

  • Target

    jecco67.exe

  • Size

    80.0MB

  • Sample

    241226-ytzahsxng1

  • MD5

    7f9421f58afba2312aa4a06a42b40b61

  • SHA1

    8cccbd183518a92de3256e6142026e6ff8db9eb5

  • SHA256

    e66ade9d2004adeeecc33b67efd45e561a5eea60864a868cd6678e26d63e68a1

  • SHA512

    235fda4eb0755c6094d68bfd023e0e7e3bd63a87579a26faf106502ea860f769fa549e19004e5fa160ee1bfd311d1c4651a70a715b94eb091bd815676abc554a

  • SSDEEP

    1572864:aGKl5WbsmwSk8IpG7V+VPhqb+TntgWJliEgT5TPxfTcrb5tnerEEExhPcLiMzV:DKLysmwSkB05awb+TGWJwny5tnery3PG

Malware Config

Targets

    • Target

      jecco67.exe

    • Size

      80.0MB

    • MD5

      7f9421f58afba2312aa4a06a42b40b61

    • SHA1

      8cccbd183518a92de3256e6142026e6ff8db9eb5

    • SHA256

      e66ade9d2004adeeecc33b67efd45e561a5eea60864a868cd6678e26d63e68a1

    • SHA512

      235fda4eb0755c6094d68bfd023e0e7e3bd63a87579a26faf106502ea860f769fa549e19004e5fa160ee1bfd311d1c4651a70a715b94eb091bd815676abc554a

    • SSDEEP

      1572864:aGKl5WbsmwSk8IpG7V+VPhqb+TntgWJliEgT5TPxfTcrb5tnerEEExhPcLiMzV:DKLysmwSkB05awb+TGWJwny5tnery3PG

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks