General
-
Target
source_prepared.exe
-
Size
80.9MB
-
Sample
240814-cmn1bavcqg
-
MD5
b725932b6972e23a7faaf6919c051560
-
SHA1
92f98126125fe7d05415bb03112e83a8e32cbdf1
-
SHA256
7809a549491d10155d1424c647bd362404d63a89a330f471f036a40f8fd1edf5
-
SHA512
3f49209ab815a09e0eef1faa441386413bc4f39b056cb68b463c81ba3d7e42eca0c7ec6edd6586dccb55180ff09b2c1c94fed44a3a2e59f12ea0be0e4b8b9568
-
SSDEEP
1572864:6XAcQglX8DWw7vaSk8IpG7V+VPhqO+6CE7ylg0iYgj+h58sMwLIG94LuqDXX:6XAc5RcneSkB05awO+6ee+53N94p
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.9MB
-
MD5
b725932b6972e23a7faaf6919c051560
-
SHA1
92f98126125fe7d05415bb03112e83a8e32cbdf1
-
SHA256
7809a549491d10155d1424c647bd362404d63a89a330f471f036a40f8fd1edf5
-
SHA512
3f49209ab815a09e0eef1faa441386413bc4f39b056cb68b463c81ba3d7e42eca0c7ec6edd6586dccb55180ff09b2c1c94fed44a3a2e59f12ea0be0e4b8b9568
-
SSDEEP
1572864:6XAcQglX8DWw7vaSk8IpG7V+VPhqO+6CE7ylg0iYgj+h58sMwLIG94LuqDXX:6XAc5RcneSkB05awO+6ee+53N94p
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1