General

  • Target

    s.zip

  • Size

    39.6MB

  • Sample

    250205-l7xbvs1rex

  • MD5

    9796d81cb5fb953823fe2e044a06cbae

  • SHA1

    4ad0ada6265c729be745213451e2844320242d77

  • SHA256

    2c660e1b097d166973b2336db271132b984e20432acdcc7bc203eb7f5057ec5c

  • SHA512

    dca93379c066b999891f80ac6b4c721c7da1c19a1d00a5733a091fbd98b4c32a71194a0b08cc8773b66b43bf24dfcb666597e90d40fbfb4c83168b98b79fc9b9

  • SSDEEP

    786432:CLQMH0mNG3yCo+45kFJ7RCkMhZn5CpxF54G8JqI166bQ4XiEKUAhPt22GcFw5maS:CUxuqVRCkMhZnspp4JfZkhhhgnk2w

Malware Config

Targets

    • Target

      s.zip

    • Size

      39.6MB

    • MD5

      9796d81cb5fb953823fe2e044a06cbae

    • SHA1

      4ad0ada6265c729be745213451e2844320242d77

    • SHA256

      2c660e1b097d166973b2336db271132b984e20432acdcc7bc203eb7f5057ec5c

    • SHA512

      dca93379c066b999891f80ac6b4c721c7da1c19a1d00a5733a091fbd98b4c32a71194a0b08cc8773b66b43bf24dfcb666597e90d40fbfb4c83168b98b79fc9b9

    • SSDEEP

      786432:CLQMH0mNG3yCo+45kFJ7RCkMhZn5CpxF54G8JqI166bQ4XiEKUAhPt22GcFw5maS:CUxuqVRCkMhZnspp4JfZkhhhgnk2w

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks