General

  • Target

    Deadrippersetup.exe

  • Size

    35.4MB

  • Sample

    250201-e2ca6sskf1

  • MD5

    d76b363c0f1fb16dc0cba3ed0629f281

  • SHA1

    1893f55e29f09a28cdfe81c416ff63ac4f6c4b12

  • SHA256

    381902f4b710d5a7e7b11d8505d6db77cf4262efbd21fca8549810ec12868a38

  • SHA512

    7569caaa782f79fb11719cb22fd46ed00ea8a6527b32099b67ae6345d14c63e4e0d66ce6daf2fa0f163791993298c7a9f06d2708ff178fba59abe410ccab1f8f

  • SSDEEP

    786432:7DGEdVl8Zml0W8ywm1N9ewO7zcY87Wkzl70XtGPfWqvdJZO4CyE:7Eml0W9wmpUE7WkzlA9G3W4dJZO4/

Malware Config

Targets

    • Target

      Deadrippersetup.exe

    • Size

      35.4MB

    • MD5

      d76b363c0f1fb16dc0cba3ed0629f281

    • SHA1

      1893f55e29f09a28cdfe81c416ff63ac4f6c4b12

    • SHA256

      381902f4b710d5a7e7b11d8505d6db77cf4262efbd21fca8549810ec12868a38

    • SHA512

      7569caaa782f79fb11719cb22fd46ed00ea8a6527b32099b67ae6345d14c63e4e0d66ce6daf2fa0f163791993298c7a9f06d2708ff178fba59abe410ccab1f8f

    • SSDEEP

      786432:7DGEdVl8Zml0W8ywm1N9ewO7zcY87Wkzl70XtGPfWqvdJZO4CyE:7Eml0W9wmpUE7WkzlA9G3W4dJZO4/

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks