General

  • Target

    Application Frame Host.exe

  • Size

    83.3MB

  • Sample

    250212-w33yyssnay

  • MD5

    fa86c3e525f23bbd54720cbfd096f7c7

  • SHA1

    3b4357e3cb453de8293dd789262a969e9ec4f4f2

  • SHA256

    24c75b4e9fcaaaa8f9da6f469a594999838eab930baa00cdb926133216c337cc

  • SHA512

    78ddc5de25f3d9b5d4b3d54e86b67500ff38b608f7f5334236038aac1e878f9eb5ef6d4ad4f2205c7b5c7f071e4b7d6ef9621e8d360464dff0eb16748c737ca4

  • SSDEEP

    1572864:HdbVlkIWnHOkiqOv8im2AO2SE7WxmlKUiY4MHHLeqPNLtDNMgZFAyNK:HdpWIoHOknOv8i352ixmMvMHVLtxT84

Malware Config

Targets

    • Target

      Application Frame Host.exe

    • Size

      83.3MB

    • MD5

      fa86c3e525f23bbd54720cbfd096f7c7

    • SHA1

      3b4357e3cb453de8293dd789262a969e9ec4f4f2

    • SHA256

      24c75b4e9fcaaaa8f9da6f469a594999838eab930baa00cdb926133216c337cc

    • SHA512

      78ddc5de25f3d9b5d4b3d54e86b67500ff38b608f7f5334236038aac1e878f9eb5ef6d4ad4f2205c7b5c7f071e4b7d6ef9621e8d360464dff0eb16748c737ca4

    • SSDEEP

      1572864:HdbVlkIWnHOkiqOv8im2AO2SE7WxmlKUiY4MHHLeqPNLtDNMgZFAyNK:HdpWIoHOknOv8i352ixmMvMHVLtxT84

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks