Resubmissions

02-01-2025 00:58

250102-bbxyeavjby 10

01-01-2025 22:56

250101-2wqyps1pcp 10

General

  • Target

    BoostX.exe

  • Size

    36.2MB

  • Sample

    250102-bbxyeavjby

  • MD5

    eb564d54266a2fe8c3d53f5500fb241d

  • SHA1

    4f409ae3fbad0f569ce332c0baac7ba690003ab8

  • SHA256

    de45b86d0366d623372e6bc76600ec2c4b869d744ccad6f12844d1d1383b7b96

  • SHA512

    c8c675729a1f746660dae0433b5cc3ea62a8e849e81925ec898993be18140d3650056d776ea48378d611e97aae62db452a974e355931a6e6ea9a8dee69841dbb

  • SSDEEP

    786432:7iIZYlOW8J/LXm1NqdbTOuzcY8763lXRXTa8vK1yn2CidJmU4/DI+:G1lOWqDXmqdfzE7ylhurc2HGE

Malware Config

Targets

    • Target

      BoostX.exe

    • Size

      36.2MB

    • MD5

      eb564d54266a2fe8c3d53f5500fb241d

    • SHA1

      4f409ae3fbad0f569ce332c0baac7ba690003ab8

    • SHA256

      de45b86d0366d623372e6bc76600ec2c4b869d744ccad6f12844d1d1383b7b96

    • SHA512

      c8c675729a1f746660dae0433b5cc3ea62a8e849e81925ec898993be18140d3650056d776ea48378d611e97aae62db452a974e355931a6e6ea9a8dee69841dbb

    • SSDEEP

      786432:7iIZYlOW8J/LXm1NqdbTOuzcY8763lXRXTa8vK1yn2CidJmU4/DI+:G1lOWqDXmqdfzE7ylhurc2HGE

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks