General
-
Target
source_prepared.exe
-
Size
81.4MB
-
Sample
240807-hs1tysxcrg
-
MD5
d490c260bffe28cfd2c43ba9cd6b3796
-
SHA1
db3c11aa14aa771d5474c16d60691ec01039f1ad
-
SHA256
1f8ea1d1209d3aaf793eae0c316d30f6c538c2ff82bd691f2c5334da67020463
-
SHA512
cc9746b7ccad6f83d9e9ba35585647040433969841049abdbe227a2e225406c5cb2d039cc08fd59822a8a17f5e89d8596f61959ec7f3bf095860749d681682ac
-
SSDEEP
1572864:dXAcQglL7v5Sk8IpG7V+VPhqO+6YE7QlgODiYgj+h58sMwgW49/H6cJX48:dXAc5t1SkB05awO+6Cec5Ep9/t4
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
81.4MB
-
MD5
d490c260bffe28cfd2c43ba9cd6b3796
-
SHA1
db3c11aa14aa771d5474c16d60691ec01039f1ad
-
SHA256
1f8ea1d1209d3aaf793eae0c316d30f6c538c2ff82bd691f2c5334da67020463
-
SHA512
cc9746b7ccad6f83d9e9ba35585647040433969841049abdbe227a2e225406c5cb2d039cc08fd59822a8a17f5e89d8596f61959ec7f3bf095860749d681682ac
-
SSDEEP
1572864:dXAcQglL7v5Sk8IpG7V+VPhqO+6YE7QlgODiYgj+h58sMwgW49/H6cJX48:dXAc5t1SkB05awO+6Cec5Ep9/t4
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-