Resubmissions

15-02-2025 22:26

250215-2cjehsxmgm 10

15-02-2025 22:21

250215-193zraxlem 10

15-02-2025 20:56

250215-zrbxwatpel 10

General

  • Target

    gtagmod.exe

  • Size

    115.6MB

  • Sample

    250215-193zraxlem

  • MD5

    c847c6452bd6e3f9bd715d8a31640e7c

  • SHA1

    9f6c96645f583a29976ffe37ff7b8add4d107248

  • SHA256

    b57f3add7e1ea2abb425894d60e8d00f1d5a7b653d2bfabc0723950560c6c240

  • SHA512

    033ec6dfabb9636a108d2b5872bbc2aa90a88f2d40ddd79eea37f3ebab3352c412454d704cab5088964649d793f6385c40697ee859870afb34057e52349c0f04

  • SSDEEP

    3145728:ncNDfZeibJjz9wHE8/2qHO5ilpBnG0iWMstB2OxQruMdc:cND/1Zw/NHCi7hieBg

Malware Config

Targets

    • Target

      gtagmod.exe

    • Size

      115.6MB

    • MD5

      c847c6452bd6e3f9bd715d8a31640e7c

    • SHA1

      9f6c96645f583a29976ffe37ff7b8add4d107248

    • SHA256

      b57f3add7e1ea2abb425894d60e8d00f1d5a7b653d2bfabc0723950560c6c240

    • SHA512

      033ec6dfabb9636a108d2b5872bbc2aa90a88f2d40ddd79eea37f3ebab3352c412454d704cab5088964649d793f6385c40697ee859870afb34057e52349c0f04

    • SSDEEP

      3145728:ncNDfZeibJjz9wHE8/2qHO5ilpBnG0iWMstB2OxQruMdc:cND/1Zw/NHCi7hieBg

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks