General

  • Target

    241231-2f92msspfx_pw_infected.zip

  • Size

    80.3MB

  • Sample

    241231-2kbpmssqhs

  • MD5

    8088db3f275f0b7ef166068b5e249623

  • SHA1

    735eb7e8d746d29e605beeff18d584a4e805e780

  • SHA256

    58e29228e7bea1af23438bedb191679b3ce6f892c48e3930920863c5c6a1c7d1

  • SHA512

    027acce6946e9e0817fa35c27ecb9b7c40fc7a6599fe076f439caa0252b5864e0dc44fa4732faae06b039eaa850fd925f8125040acbb373c5c83d8f54a67c69f

  • SSDEEP

    1572864:vY00hT+4sxW1GJhAyoDKCTWaSJwG0B2KBsFWOIZRD7n+UiBH9uX10bTLFo:AIpWlT+aSKZ8KBsxIZMBPbTLFo

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      80.7MB

    • MD5

      9602740c00f3a0fd2f4112e07a823698

    • SHA1

      2f3777c223cdf15738f6ccf6b2f8004f7f32191b

    • SHA256

      88af6be6296add5e995b44d3226ba7ef53514101caa913301f4ba8f0380ce536

    • SHA512

      511c9329722ac7aa0ef018be0745ff5e983cfffaada423e879923d0481d9b9d46b7100e82b395b98411e8a61d4942dd0cb8ba1b6cf05feb6ae4c4063b8ca4037

    • SSDEEP

      1572864:dGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw/DBZB:cK51smwSkB05awFVwE65Dt

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks