General

  • Target

    spiffy.ware (1).rar

  • Size

    85.7MB

  • Sample

    250201-q5zfnawrgn

  • MD5

    1cec77947f8aec801f8728042d02609d

  • SHA1

    54c6353b2d74381c4e8f727e50fcc98d0e2649f7

  • SHA256

    e411727fdec4211740bc4f292766a8ae189bbcb98fe696ecffd5b6e1d19c3e0c

  • SHA512

    1c4df3ceb83174c09476ab93ef357d7a7cf101a65e9d3b049f5efbca96c479f076686adaa13f8676606efaf69abbec9c178528c827b11d2a27590cd38ce1bc41

  • SSDEEP

    1572864:sn1i7FqiNge1PcS4qZ7TV8aZ5eqyRs9kEQ0jC9hYsM3Q7ZTUHi2FZ+I:G1i7FqiNXPZn8A5eqyRs9a0jC9uA7ZTG

Malware Config

Targets

    • Target

      spiffy.ware (1).rar

    • Size

      85.7MB

    • MD5

      1cec77947f8aec801f8728042d02609d

    • SHA1

      54c6353b2d74381c4e8f727e50fcc98d0e2649f7

    • SHA256

      e411727fdec4211740bc4f292766a8ae189bbcb98fe696ecffd5b6e1d19c3e0c

    • SHA512

      1c4df3ceb83174c09476ab93ef357d7a7cf101a65e9d3b049f5efbca96c479f076686adaa13f8676606efaf69abbec9c178528c827b11d2a27590cd38ce1bc41

    • SSDEEP

      1572864:sn1i7FqiNge1PcS4qZ7TV8aZ5eqyRs9kEQ0jC9hYsM3Q7ZTUHi2FZ+I:G1i7FqiNXPZn8A5eqyRs9a0jC9uA7ZTG

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks