General

  • Target

    source_prepared.exe

  • Size

    86.9MB

  • Sample

    250210-p5xrdssrhx

  • MD5

    7101ab3efaf3baf5c615b9d6d111fdf6

  • SHA1

    ebef4c414ef1b3811e674a3cab69ff99fa984839

  • SHA256

    e92cd8e53a7a0f1240cf674c1834be4085ffac351d568f287c5cedb6b5cbd036

  • SHA512

    81e65189f8f0b76bd03f53ded4c2c5ad99079724282dc110e28ae4975c8c9a7e9456527f6ed113dfd7fb105e649891cbda29de66039852502c1c68df12222f35

  • SSDEEP

    1572864:t2GKl+WXr8sm/OkiqOv8im2A+79E7olitnnBiYgj+h58sMwA3e3VilcJ5Vrh:tnK4Dsm/OknOv8i3J7pwpT503e3VhV

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      86.9MB

    • MD5

      7101ab3efaf3baf5c615b9d6d111fdf6

    • SHA1

      ebef4c414ef1b3811e674a3cab69ff99fa984839

    • SHA256

      e92cd8e53a7a0f1240cf674c1834be4085ffac351d568f287c5cedb6b5cbd036

    • SHA512

      81e65189f8f0b76bd03f53ded4c2c5ad99079724282dc110e28ae4975c8c9a7e9456527f6ed113dfd7fb105e649891cbda29de66039852502c1c68df12222f35

    • SSDEEP

      1572864:t2GKl+WXr8sm/OkiqOv8im2A+79E7olitnnBiYgj+h58sMwA3e3VilcJ5Vrh:tnK4Dsm/OknOv8i3J7pwpT503e3VhV

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks