General

  • Target

    Spoofer (untested).exe

  • Size

    24.5MB

  • Sample

    250223-eql18swmhw

  • MD5

    fc028c5f1a875995dbdd5b2893e9822f

  • SHA1

    3346c5180cff457c73c432ff016f15c045c17551

  • SHA256

    52311bb93549afa22033947907157c3cfaf62df20a63ca2fbe8de9b4a66741d4

  • SHA512

    e01413a31798aa9c2c61126501aef6e6d5413915cea59a4414be52c9f86cc9c71ccd3f99356c693b21056cab842055db27077b7fcf5cc14335e925686bf2c02e

  • SSDEEP

    393216:262L62LqCeYw5OtW8avSiIZA0dfY8so9L/gmiVOdlVJIe:jowIW8cqflsoN/FRlVWe

Malware Config

Targets

    • Target

      Spoofer (untested).exe

    • Size

      24.5MB

    • MD5

      fc028c5f1a875995dbdd5b2893e9822f

    • SHA1

      3346c5180cff457c73c432ff016f15c045c17551

    • SHA256

      52311bb93549afa22033947907157c3cfaf62df20a63ca2fbe8de9b4a66741d4

    • SHA512

      e01413a31798aa9c2c61126501aef6e6d5413915cea59a4414be52c9f86cc9c71ccd3f99356c693b21056cab842055db27077b7fcf5cc14335e925686bf2c02e

    • SSDEEP

      393216:262L62LqCeYw5OtW8avSiIZA0dfY8so9L/gmiVOdlVJIe:jowIW8cqflsoN/FRlVWe

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks