General
-
Target
Blitz_Executor.rar
-
Size
146.8MB
-
Sample
240417-r1g69acd72
-
MD5
a9c83b5935149f37107089d2ec9a9f28
-
SHA1
b677ba484bb60dfbcd741994cc29e9dd0b21462f
-
SHA256
52fd1376991ae2415d07781fc28580e64f61db8631a36a4c1f81579a9fd80d69
-
SHA512
bdfb858dbaba4195644b7dabf649c2f494eec39f4fc99b60bb4dabf8ba5f67ac277a3daddf26c083aab54a3123a42a9eebd8f1e5bcba966fae3cf5cf7d07b4bd
-
SSDEEP
3145728:i6Z0IxJaH2kea6N7kEPRWrI6q96Z0IxJaH2kea6N7kEPRWrI6qJ:i66ykeTDWVq966ykeTDWVqJ
Behavioral task
behavioral1
Sample
BLITZ/Executor.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
BLITZ/Executor.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
BLITZ/Loader.exe
Resource
win7-20240319-en
Behavioral task
behavioral4
Sample
BLITZ/Loader.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
BLITZ/Executor.exe
-
Size
76.4MB
-
MD5
a0bcca58f1f2ac26f61a98e7e39e4ac7
-
SHA1
0b52c6739146dceee2bdf84dae2d623f40af38fa
-
SHA256
481a3e433855191796275af97985d0b68ba0802bb902aacd4c45c511ae671565
-
SHA512
fbd99ea610f1c1c31699a53155fa1ee13a518eb5737be559f09a44c3c757c0d93eb8afa26cf533ef22a954e12e690fbef2139ee24b8de8dca18e5a5364c428eb
-
SSDEEP
1572864:bviEZjTAWSk8IpG7V+VPhqQdSsE7mjxziYweyJulZUdgl0WVojPm11qZ9U3:bvZZgWSkB05awkSwtspuB0cM39U
Score9/10-
Enumerates VirtualBox DLL files
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
BLITZ/Loader.exe
-
Size
76.4MB
-
MD5
a0bcca58f1f2ac26f61a98e7e39e4ac7
-
SHA1
0b52c6739146dceee2bdf84dae2d623f40af38fa
-
SHA256
481a3e433855191796275af97985d0b68ba0802bb902aacd4c45c511ae671565
-
SHA512
fbd99ea610f1c1c31699a53155fa1ee13a518eb5737be559f09a44c3c757c0d93eb8afa26cf533ef22a954e12e690fbef2139ee24b8de8dca18e5a5364c428eb
-
SSDEEP
1572864:bviEZjTAWSk8IpG7V+VPhqQdSsE7mjxziYweyJulZUdgl0WVojPm11qZ9U3:bvZZgWSkB05awkSwtspuB0cM39U
Score9/10-
Enumerates VirtualBox DLL files
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-