General
-
Target
VirtualBox-7.0.18-162988-Win.exe
-
Size
104.6MB
-
Sample
240619-wg2trsvhqf
-
MD5
6a046a57ca3dd222d8bf1410b8172f81
-
SHA1
49888a74780ac09ab6ec99bbcca5950890e5a227
-
SHA256
4c83894c00aa9f55f7e0f70807210896ba32e1222d4ff1d0b9487af81f328f36
-
SHA512
cb19129d62253bde686618cba40449ed05d5435ae11dbbb83ebc9a1b308fc7e9387cb964cb4cf26e91d7e38b9e8b75ebcb5de8039379986bf95cc77456a65a4b
-
SSDEEP
3145728:aTdp/Gww7IEwmuQYIuSwHn9B4mzL8M6Wfwf:aFw70RQYIfwM6Q7+wf
Static task
static1
Behavioral task
behavioral1
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win7-20240611-en
Behavioral task
behavioral3
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win11-20240611-en
Malware Config
Targets
-
-
Target
VirtualBox-7.0.18-162988-Win.exe
-
Size
104.6MB
-
MD5
6a046a57ca3dd222d8bf1410b8172f81
-
SHA1
49888a74780ac09ab6ec99bbcca5950890e5a227
-
SHA256
4c83894c00aa9f55f7e0f70807210896ba32e1222d4ff1d0b9487af81f328f36
-
SHA512
cb19129d62253bde686618cba40449ed05d5435ae11dbbb83ebc9a1b308fc7e9387cb964cb4cf26e91d7e38b9e8b75ebcb5de8039379986bf95cc77456a65a4b
-
SSDEEP
3145728:aTdp/Gww7IEwmuQYIuSwHn9B4mzL8M6Wfwf:aFw70RQYIfwM6Q7+wf
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
2Gatekeeper Bypass
1Install Root Certificate
1