General

  • Target

    source_prepared.exe

  • Size

    83.1MB

  • Sample

    250124-nfyrqaxlcl

  • MD5

    af09b1161efb40f91b3eaebfc9d05d4c

  • SHA1

    3adb6460a7769856a4002453c383079da6f34e48

  • SHA256

    2c1f61393fee041bb815e13e25760a3f7ed06ee5f730faf8b26913a583168ba6

  • SHA512

    d5525b090949da2db1b28acc1494d5fe4c1ec38e4f55c2466542ec29d649595de7745f377080347e3ce105c1dd6743af9604c69f4c9a5ce56c8f7513c1c69e09

  • SSDEEP

    1572864:zVjlQWdFm7OkiqOv8im2AqlE7glhCiYweyJulZUdgMzZDd72:p20Fm7OknOv8i3d5LfpuoRZ2

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      83.1MB

    • MD5

      af09b1161efb40f91b3eaebfc9d05d4c

    • SHA1

      3adb6460a7769856a4002453c383079da6f34e48

    • SHA256

      2c1f61393fee041bb815e13e25760a3f7ed06ee5f730faf8b26913a583168ba6

    • SHA512

      d5525b090949da2db1b28acc1494d5fe4c1ec38e4f55c2466542ec29d649595de7745f377080347e3ce105c1dd6743af9604c69f4c9a5ce56c8f7513c1c69e09

    • SSDEEP

      1572864:zVjlQWdFm7OkiqOv8im2AqlE7glhCiYweyJulZUdgMzZDd72:p20Fm7OknOv8i3d5LfpuoRZ2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks