General
-
Target
test.exe
-
Size
77.6MB
-
Sample
240802-xmag5s1bqc
-
MD5
192cc17a194dd329b978f033ce690442
-
SHA1
4b2b0f38cd7adfe107c7aaa2cc03ef64dc87bd9b
-
SHA256
f36968675e65a1ddc08f5f983b468137b1cdb40d3dd88899e5b21d5fbd086319
-
SHA512
6f274824e1d3959ab7302c06aaabddc8bf8b6cb2c47ec2329a57706c5de6bb046b75043052aacb2bc5a7fcee6268cdc62a3feee9d44ebd436cf037f0a35592ce
-
SSDEEP
1572864:MvHcRlq9h7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4nauxa/Z9UN/:MvHcRahTSkB05awqfhdCpukdRzs9U
Behavioral task
behavioral1
Sample
test.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
test.exe
-
Size
77.6MB
-
MD5
192cc17a194dd329b978f033ce690442
-
SHA1
4b2b0f38cd7adfe107c7aaa2cc03ef64dc87bd9b
-
SHA256
f36968675e65a1ddc08f5f983b468137b1cdb40d3dd88899e5b21d5fbd086319
-
SHA512
6f274824e1d3959ab7302c06aaabddc8bf8b6cb2c47ec2329a57706c5de6bb046b75043052aacb2bc5a7fcee6268cdc62a3feee9d44ebd436cf037f0a35592ce
-
SSDEEP
1572864:MvHcRlq9h7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4nauxa/Z9UN/:MvHcRahTSkB05awqfhdCpukdRzs9U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-