General
-
Target
NZP.exe
-
Size
103.4MB
-
Sample
240808-s2vpeayhjd
-
MD5
66d7df10f82ac4a7a5021e305fb3a560
-
SHA1
774504d7ff3957a8d141d33b9a6fe9c8f8b15b9b
-
SHA256
8a46ee75e9ff83fca1310134751cedf8edac0ef10c9ce4656d368daebf4e0826
-
SHA512
ed2cbf821c8ad11bfc3b82b6a59297b4924491d7e979e3213043ca99e4b49053c66a47c0dfe3f316c646f357193691e2dd603c752bd7d170f092bfbb425390be
-
SSDEEP
3145728:pCOb8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWSs9U:DgSWNaIsHCiH1XcBWP
Behavioral task
behavioral1
Sample
NZP.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
NZP.exe
-
Size
103.4MB
-
MD5
66d7df10f82ac4a7a5021e305fb3a560
-
SHA1
774504d7ff3957a8d141d33b9a6fe9c8f8b15b9b
-
SHA256
8a46ee75e9ff83fca1310134751cedf8edac0ef10c9ce4656d368daebf4e0826
-
SHA512
ed2cbf821c8ad11bfc3b82b6a59297b4924491d7e979e3213043ca99e4b49053c66a47c0dfe3f316c646f357193691e2dd603c752bd7d170f092bfbb425390be
-
SSDEEP
3145728:pCOb8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWSs9U:DgSWNaIsHCiH1XcBWP
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-