General

  • Target

    Hx Bypass.exe

  • Size

    83.1MB

  • Sample

    250124-kvsbpszqc1

  • MD5

    e863d1f40f37388f27cde6200b1a06a9

  • SHA1

    d7c8a6574b4d6a5a96626dfc86f591326bd50279

  • SHA256

    19c7a330a81bef7cb9108a5b8563911a46fd691c4106ba0a5539bead0a44e957

  • SHA512

    fa6239603d72704467b5c51c72ec1f19209c78f374564a33ce01783e1f333cb62b7b4fd0a92110ced4b09a7c2be20468b1ed6b561097405c1a0c4171e8ddfea2

  • SSDEEP

    1572864:7VjlQWdFm7OkiqOv8im2AqlE7glhCiYweyJulZUdgMzZDd72:R20Fm7OknOv8i3d5LfpuoRZ2

Malware Config

Targets

    • Target

      Hx Bypass.exe

    • Size

      83.1MB

    • MD5

      e863d1f40f37388f27cde6200b1a06a9

    • SHA1

      d7c8a6574b4d6a5a96626dfc86f591326bd50279

    • SHA256

      19c7a330a81bef7cb9108a5b8563911a46fd691c4106ba0a5539bead0a44e957

    • SHA512

      fa6239603d72704467b5c51c72ec1f19209c78f374564a33ce01783e1f333cb62b7b4fd0a92110ced4b09a7c2be20468b1ed6b561097405c1a0c4171e8ddfea2

    • SSDEEP

      1572864:7VjlQWdFm7OkiqOv8im2AqlE7glhCiYweyJulZUdgMzZDd72:R20Fm7OknOv8i3d5LfpuoRZ2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks