General

  • Target

    VexWare (5).exe

  • Size

    87.6MB

  • Sample

    250201-tk9bxazkay

  • MD5

    318b6716eb2f476d49dc2b5696e72095

  • SHA1

    12f88564f2001f7ac1ffe0a33c024beaea8e4d51

  • SHA256

    1e460d6497fb44ad2dd621290380c96858382b8a773e6871c4ffc0ef5a95a196

  • SHA512

    d009ca79c889dde0a58c06014f5f646aae74deebd5ec358ebdcebce712096afefc677db20b2b5689846628ae903d2723d8a01dd43e66771b4faefb8790de99d5

  • SSDEEP

    1572864:A2GKlXebWqsm/OkiqOv8im2A3+T9E7CliHiYgj+h58sMw5I6e389PcJFJZ:AnKRCtsm/OknOv8i36+TXwZ5FHe38gJ

Malware Config

Targets

    • Target

      VexWare (5).exe

    • Size

      87.6MB

    • MD5

      318b6716eb2f476d49dc2b5696e72095

    • SHA1

      12f88564f2001f7ac1ffe0a33c024beaea8e4d51

    • SHA256

      1e460d6497fb44ad2dd621290380c96858382b8a773e6871c4ffc0ef5a95a196

    • SHA512

      d009ca79c889dde0a58c06014f5f646aae74deebd5ec358ebdcebce712096afefc677db20b2b5689846628ae903d2723d8a01dd43e66771b4faefb8790de99d5

    • SSDEEP

      1572864:A2GKlXebWqsm/OkiqOv8im2A3+T9E7CliHiYgj+h58sMw5I6e389PcJFJZ:AnKRCtsm/OknOv8i36+TXwZ5FHe38gJ

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks