General

  • Target

    idk.exe

  • Size

    107.6MB

  • Sample

    250108-q81swssmbx

  • MD5

    e9fb64dd2e7a0ff9f9a16040eace1a99

  • SHA1

    767788816f7bff0c757e98607851215f31084454

  • SHA256

    7569509db7533d44ae999b8b50e4e918906c71edc3d57b6cba2b6696880240fa

  • SHA512

    d9b466767798af962ff1e7e453601eef8671ab5b851b49e18ddd4aff8f8e6da3d3fcaab5a3e4886e76e9adb8de890b3d0d460f62168a25b5065d0394dba88b0e

  • SSDEEP

    3145728:0cN7eCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxQwu4RM:rN7JjSWNa6NHCiWhieBB

Malware Config

Targets

    • Target

      idk.exe

    • Size

      107.6MB

    • MD5

      e9fb64dd2e7a0ff9f9a16040eace1a99

    • SHA1

      767788816f7bff0c757e98607851215f31084454

    • SHA256

      7569509db7533d44ae999b8b50e4e918906c71edc3d57b6cba2b6696880240fa

    • SHA512

      d9b466767798af962ff1e7e453601eef8671ab5b851b49e18ddd4aff8f8e6da3d3fcaab5a3e4886e76e9adb8de890b3d0d460f62168a25b5065d0394dba88b0e

    • SSDEEP

      3145728:0cN7eCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxQwu4RM:rN7JjSWNa6NHCiWhieBB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks