General
-
Target
VirtualBox-7.0.10-158379-Win.exe
-
Size
105.8MB
-
Sample
230901-g2z4cach6s
-
MD5
8882a55227cccc8a3f7ab69641df19fd
-
SHA1
5ea28f4fb204e6c50d1306f2e135eb40c8f1fe83
-
SHA256
62545b8eb17ddf27d5954ac5f8904814e12c5790d73daf545ef60bd97f4f2e12
-
SHA512
d57a47ebc4ab383efa35b1505426c11207c1ed0d1ad9bd826ec252a6f6aa2bfe0debc379869fbb3cc8cafce17badcfd855d2b85e72d7485643a286ac81278c0c
-
SSDEEP
3145728:Km59GTfa+aEDsv1Wt+y16flApINSNICSzlKL:L9G4EDsIzoflJNnI
Static task
static1
Behavioral task
behavioral1
Sample
VirtualBox-7.0.10-158379-Win.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
VirtualBox-7.0.10-158379-Win.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
VirtualBox-7.0.10-158379-Win.exe
Resource
win10v2004-20230831-en
Malware Config
Targets
-
-
Target
VirtualBox-7.0.10-158379-Win.exe
-
Size
105.8MB
-
MD5
8882a55227cccc8a3f7ab69641df19fd
-
SHA1
5ea28f4fb204e6c50d1306f2e135eb40c8f1fe83
-
SHA256
62545b8eb17ddf27d5954ac5f8904814e12c5790d73daf545ef60bd97f4f2e12
-
SHA512
d57a47ebc4ab383efa35b1505426c11207c1ed0d1ad9bd826ec252a6f6aa2bfe0debc379869fbb3cc8cafce17badcfd855d2b85e72d7485643a286ac81278c0c
-
SSDEEP
3145728:Km59GTfa+aEDsv1Wt+y16flApINSNICSzlKL:L9G4EDsIzoflJNnI
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1