General

  • Target

    source_prepared.exe

  • Size

    84.1MB

  • Sample

    250321-xttjlawwhz

  • MD5

    93f046badf8b5175ec05d50037c4d5fc

  • SHA1

    b3b9b295a51e8abc6dd49cdd9e925f76b27810bf

  • SHA256

    3c6f5107ee6b84574bffbbb56d74f4b5df955b40183613d62ce388905a407d6b

  • SHA512

    8fd69e9019973b48696afa9143642dd64c8862af126264d658c73a4fcec157282b8343e93e280cc592cdd230babff4188b240b4dae2424a63589f49a8bc005f7

  • SSDEEP

    1572864:utIupuqVjl/lWXdP4OkiqOv8im2AUdfUE7nlhnwgiYweyJulZUdg/Xgz2UZvkOJv:NYFrcdgOknOv8i3XfNLwZpu7XgznkOF

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      84.1MB

    • MD5

      93f046badf8b5175ec05d50037c4d5fc

    • SHA1

      b3b9b295a51e8abc6dd49cdd9e925f76b27810bf

    • SHA256

      3c6f5107ee6b84574bffbbb56d74f4b5df955b40183613d62ce388905a407d6b

    • SHA512

      8fd69e9019973b48696afa9143642dd64c8862af126264d658c73a4fcec157282b8343e93e280cc592cdd230babff4188b240b4dae2424a63589f49a8bc005f7

    • SSDEEP

      1572864:utIupuqVjl/lWXdP4OkiqOv8im2AUdfUE7nlhnwgiYweyJulZUdg/Xgz2UZvkOJv:NYFrcdgOknOv8i3XfNLwZpu7XgznkOF

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.