General

  • Target

    Injector.exe

  • Size

    68.8MB

  • Sample

    250224-l6y43awnx2

  • MD5

    c43cf791c9a67e57d78f47177b73db5e

  • SHA1

    d211284c160cc7544d8c1ddcd22aef52e066165c

  • SHA256

    311ce15734609d5f53c8ad1901be1373f233abbb23d7f11c330cb921d39ae54d

  • SHA512

    3408552e9e56f6d0cc5d2a21d91702bb93d3b86f3c243979184df56bdb7ba326df341b69cd39b40f2cebe0851edc1b2975ef2d02e687167971b5be32dfea3ac2

  • SSDEEP

    1572864:RfcQtIe3iirAH8+1osuTCSxOB6xMLiIpz2qHWB75il+WBZo0Wo4Dxo:tciiS6xjKcBa6R2qHO5izBW0zCO

Malware Config

Targets

    • Target

      Injector.exe

    • Size

      68.8MB

    • MD5

      c43cf791c9a67e57d78f47177b73db5e

    • SHA1

      d211284c160cc7544d8c1ddcd22aef52e066165c

    • SHA256

      311ce15734609d5f53c8ad1901be1373f233abbb23d7f11c330cb921d39ae54d

    • SHA512

      3408552e9e56f6d0cc5d2a21d91702bb93d3b86f3c243979184df56bdb7ba326df341b69cd39b40f2cebe0851edc1b2975ef2d02e687167971b5be32dfea3ac2

    • SSDEEP

      1572864:RfcQtIe3iirAH8+1osuTCSxOB6xMLiIpz2qHWB75il+WBZo0Wo4Dxo:tciiS6xjKcBa6R2qHO5izBW0zCO

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks