General

  • Target

    malware.exe

  • Size

    84.0MB

  • Sample

    250210-qtb6zstncx

  • MD5

    687baaab0ee08cfd5cb1916761190310

  • SHA1

    86777dcd5cde71816f2a8796d6449a97a97b044f

  • SHA256

    cb4cfbae08ffa644c90e4803f7c744d5db6ab71a8ca52bd6fdc48eca7a05bbe3

  • SHA512

    c13f6ff7cd569345d3586619b0fb39515d41d44f506cdc8811e2dc1827e4a5ca12d56f6c5913d87783ed2739b0cca181ba56152b9837ffa4e15593f003c3ae88

  • SSDEEP

    1572864:vVjl4WB6dIm7OkiqOv8im2A3+TUE7slh+eiYweyJulZUdgKXHwCHZvkOgs1:F+ddIm7OknOv8i36+TCLkpumXtkO5

Malware Config

Targets

    • Target

      malware.exe

    • Size

      84.0MB

    • MD5

      687baaab0ee08cfd5cb1916761190310

    • SHA1

      86777dcd5cde71816f2a8796d6449a97a97b044f

    • SHA256

      cb4cfbae08ffa644c90e4803f7c744d5db6ab71a8ca52bd6fdc48eca7a05bbe3

    • SHA512

      c13f6ff7cd569345d3586619b0fb39515d41d44f506cdc8811e2dc1827e4a5ca12d56f6c5913d87783ed2739b0cca181ba56152b9837ffa4e15593f003c3ae88

    • SSDEEP

      1572864:vVjl4WB6dIm7OkiqOv8im2A3+TUE7slh+eiYweyJulZUdgKXHwCHZvkOgs1:F+ddIm7OknOv8i36+TCLkpumXtkO5

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks