General

  • Target

    Vencord+.exe

  • Size

    116.4MB

  • Sample

    250212-vbz8bazpcw

  • MD5

    65c321f04140bbc42be35762bd38fda3

  • SHA1

    969d42a49ac1f530c791584faee4ebb32d61bede

  • SHA256

    1ddb43f7f6ffd283b6c38e0a1a9dba0cc758d9f65c5710eee6eca1b715ca20db

  • SHA512

    b8c8313a3b3f8a23ff7dd11f8ea122d1a49438f39a17239282ef45b417d9beadad79db3386bd356baf33ef95b9c516b060f3250249f4544c0193eed52062f8fa

  • SSDEEP

    3145728:2cNveCRZeibJjz9wHE8/2qHO5iCpBnG0iWMstB2Ox+bu4R6:1NvJN1Zw/NHCiWhieBS

Malware Config

Targets

    • Target

      Vencord+.exe

    • Size

      116.4MB

    • MD5

      65c321f04140bbc42be35762bd38fda3

    • SHA1

      969d42a49ac1f530c791584faee4ebb32d61bede

    • SHA256

      1ddb43f7f6ffd283b6c38e0a1a9dba0cc758d9f65c5710eee6eca1b715ca20db

    • SHA512

      b8c8313a3b3f8a23ff7dd11f8ea122d1a49438f39a17239282ef45b417d9beadad79db3386bd356baf33ef95b9c516b060f3250249f4544c0193eed52062f8fa

    • SSDEEP

      3145728:2cNveCRZeibJjz9wHE8/2qHO5iCpBnG0iWMstB2Ox+bu4R6:1NvJN1Zw/NHCiWhieBS

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks