General

  • Target

    source_prepared.exe

  • Size

    59.7MB

  • Sample

    250214-wgfarswjen

  • MD5

    ec591bd84a93518bbabcca6490db9d7f

  • SHA1

    b1b1eea638ec5e1630532fc6af8b845672818da1

  • SHA256

    c329a1a274a50588a935fdbf6b5f79fd64ae78ec5b55a9614915e48ab316e82e

  • SHA512

    ce363990f40e99d1f93a7b7fa38bcda0e0bcf95cefe025061f19ecc816f94ab77207df3647d747d09bee5738a1c1bc7464d38c1c057aa8c4067113196349d6d7

  • SSDEEP

    1572864:uVjl9KW561RnOkiqOv8im2A3+TUE7glSe7fEoI6XhK2zjIH:6ed1RnOknOv8i36+Tm8PovXQdH

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      59.7MB

    • MD5

      ec591bd84a93518bbabcca6490db9d7f

    • SHA1

      b1b1eea638ec5e1630532fc6af8b845672818da1

    • SHA256

      c329a1a274a50588a935fdbf6b5f79fd64ae78ec5b55a9614915e48ab316e82e

    • SHA512

      ce363990f40e99d1f93a7b7fa38bcda0e0bcf95cefe025061f19ecc816f94ab77207df3647d747d09bee5738a1c1bc7464d38c1c057aa8c4067113196349d6d7

    • SSDEEP

      1572864:uVjl9KW561RnOkiqOv8im2A3+TUE7glSe7fEoI6XhK2zjIH:6ed1RnOknOv8i36+Tm8PovXQdH

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks