General
-
Target
test.exe
-
Size
24.2MB
-
Sample
240619-st24hssflc
-
MD5
0919a586daf614c482099b03d6e7582c
-
SHA1
aa0e27d3f46b5b2b127afc893fac730d85228a61
-
SHA256
040ae92d9079b9ac82f370cd8ad27bd49b5d3d5100b3182facbfda824531ee55
-
SHA512
4f7b24f9310758d4f80b16fef4ac17faafd6f3602ccbed75345e5592774edd588c3b8035439825fbda708f6bb1163c5404bc95fde7822ae65e120043f63226ca
-
SSDEEP
786432:yXZZKMr4dbEOOKMsAXB48vdW8m9x5cCD95kg+:yJZjr4dIDjxO0WVOCpKg
Malware Config
Targets
-
-
Target
test.exe
-
Size
24.2MB
-
MD5
0919a586daf614c482099b03d6e7582c
-
SHA1
aa0e27d3f46b5b2b127afc893fac730d85228a61
-
SHA256
040ae92d9079b9ac82f370cd8ad27bd49b5d3d5100b3182facbfda824531ee55
-
SHA512
4f7b24f9310758d4f80b16fef4ac17faafd6f3602ccbed75345e5592774edd588c3b8035439825fbda708f6bb1163c5404bc95fde7822ae65e120043f63226ca
-
SSDEEP
786432:yXZZKMr4dbEOOKMsAXB48vdW8m9x5cCD95kg+:yJZjr4dIDjxO0WVOCpKg
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-