General
-
Target
source_prepared.exe
-
Size
103.4MB
-
Sample
240807-cdkars1enh
-
MD5
a94312dc9504ddaa6dff75aaf9cba798
-
SHA1
b0f6a269a0cfebcf895d7d9fbae85590bff163da
-
SHA256
0a55c8bd91f3e0a954aea0c039390316d93e86a90d84d501905c14baa70ce651
-
SHA512
ef60734350ca2cbbe7a965d710df1b0a248951d8a643f7aee83cce4f0ae72b700d33a7f3842565cbe74eb79a1730accd018fd06d17bdd735d4dc8b9d109c5144
-
SSDEEP
3145728:egOb8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWxs9U:qgSWNaIsHCiH1XcBW+
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
103.4MB
-
MD5
a94312dc9504ddaa6dff75aaf9cba798
-
SHA1
b0f6a269a0cfebcf895d7d9fbae85590bff163da
-
SHA256
0a55c8bd91f3e0a954aea0c039390316d93e86a90d84d501905c14baa70ce651
-
SHA512
ef60734350ca2cbbe7a965d710df1b0a248951d8a643f7aee83cce4f0ae72b700d33a7f3842565cbe74eb79a1730accd018fd06d17bdd735d4dc8b9d109c5144
-
SSDEEP
3145728:egOb8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWxs9U:qgSWNaIsHCiH1XcBW+
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-