General

  • Target

    source_prepared.exe

  • Size

    88.3MB

  • Sample

    250411-q9c38a1sdv

  • MD5

    d8ae9a2634bc06c72205c5107dac8c84

  • SHA1

    fed4e8e48945c802227f7eea7b0a7f16acf9b166

  • SHA256

    155dbfc1ad45da20156863ffb2999aea4c6f2ce268c0622120d221824b4ab38c

  • SHA512

    d268e395ee466fd1c26e2dbd20f31fa48fdb98ddb104e52bf36d6b06ff06458fded1d49a16bf84f7b7b11271144b4180b30db459f7d439bc961624ca58e3df30

  • SSDEEP

    1572864:jtIupudNK/l1WLGP0OkiqOv8im2AK7E7lliCiYgj+h58sMwEAPDecJ5Af:aYoWbvMOknOv8i39ewM5QAPPA

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      88.3MB

    • MD5

      d8ae9a2634bc06c72205c5107dac8c84

    • SHA1

      fed4e8e48945c802227f7eea7b0a7f16acf9b166

    • SHA256

      155dbfc1ad45da20156863ffb2999aea4c6f2ce268c0622120d221824b4ab38c

    • SHA512

      d268e395ee466fd1c26e2dbd20f31fa48fdb98ddb104e52bf36d6b06ff06458fded1d49a16bf84f7b7b11271144b4180b30db459f7d439bc961624ca58e3df30

    • SSDEEP

      1572864:jtIupudNK/l1WLGP0OkiqOv8im2AK7E7lliCiYgj+h58sMwEAPDecJ5Af:aYoWbvMOknOv8i39ewM5QAPPA

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks