General
-
Target
Kellen raper.exe
-
Size
100.8MB
-
Sample
240812-b79bbatfpa
-
MD5
c93b1b820d8d53787c64aa3fbf768373
-
SHA1
c030d8dbc4e2bc87575e288677e1a95c8d57bd3e
-
SHA256
e59cb6527b155c7393b39dc72860a3117c6b0a1eefa684f40647e2d616f210e8
-
SHA512
974aba22302a00a380deb0e2de5e60173963e224f9a18b0d95aa123e4e32e28758d2922add180334910d2cdcac19f2ba2b4348e28863e535daf4ed148686b07e
-
SSDEEP
3145728:NnHbrS6xjKcBaF2qHO5iEgJmnGr/hjLtsA0qy5Ed8m3X5W:FH3SWNaDHCiFXP0qy9gY
Behavioral task
behavioral1
Sample
Kellen raper.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Kellen raper.exe
-
Size
100.8MB
-
MD5
c93b1b820d8d53787c64aa3fbf768373
-
SHA1
c030d8dbc4e2bc87575e288677e1a95c8d57bd3e
-
SHA256
e59cb6527b155c7393b39dc72860a3117c6b0a1eefa684f40647e2d616f210e8
-
SHA512
974aba22302a00a380deb0e2de5e60173963e224f9a18b0d95aa123e4e32e28758d2922add180334910d2cdcac19f2ba2b4348e28863e535daf4ed148686b07e
-
SSDEEP
3145728:NnHbrS6xjKcBaF2qHO5iEgJmnGr/hjLtsA0qy5Ed8m3X5W:FH3SWNaDHCiFXP0qy9gY
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Virtualization/Sandbox Evasion
1