General
-
Target
Launcher v6.0 (1).rar
-
Size
74.1MB
-
Sample
240812-xqmlwavejj
-
MD5
de820cc543d43815f3a780dbad13c131
-
SHA1
bc3be096d2ef2cfa87720021c6e835f54eafad69
-
SHA256
49dac663fbf5bef28eed78403ed0c356dac845d29af7c96b34c5d32f9e8d9a63
-
SHA512
e419c527e547f017528060f099c94337afcb848ade6094727bc3cd7e261a074c6ac68eac3700318485ad91929bdb6acd592ece3b54ea5076df2b61f721217460
-
SSDEEP
1572864:TnOt4L2MNaK1OaMKYqOUWaMNJ6kB5ejiGQEm00Uz4H/jCjWPsD:qt3PlaXYMkvUJmQ4HLt2
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Launcher.exe
-
Size
77.6MB
-
MD5
b7c77822d07af8223b061f49df46cf5a
-
SHA1
1ed87417f258867fe1001cf2605e2b2f3e1c03c6
-
SHA256
2abccde5a537cfbba983257ace4238e009a4dea56b5aadb0bfe843916916c8d2
-
SHA512
ba82da6801dd0b794d54484f6bac54c266035d1cfb425f4501af51124567db89986c458078557a96b6af16e6e0fe464a27ccd1845a3d12919ceee6ad72355f75
-
SSDEEP
1572864:DxvHcRlPKh7vXSk8IpG7V+VPhqWdfME7FFlHFziYweyJulZUdgAdW4mVuxa/Z9UR:DxvHcRAhTSkB05awqfhdCpukdRPs9U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-