General
-
Target
52c92275184daa9f8dc3a4363014e89cad297dd91ea965d4a35ab1129bd82b67
-
Size
80.7MB
-
Sample
240815-ynheta1bpg
-
MD5
c4b288f385a805993ea25e3b0bc9b4f8
-
SHA1
83c57d8d210c8782bc13ee07bfa09a2dec8750a6
-
SHA256
52c92275184daa9f8dc3a4363014e89cad297dd91ea965d4a35ab1129bd82b67
-
SHA512
9b413350eef11d6c70094d5ff4f628f3e21b4ba4def7b388b580fc682993b0ed9deec7317171353244392b3e9377f5450fa8e877235dad534a438f7d4489aee0
-
SSDEEP
1572864:NvxZQglXJdW97vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5Is9bKucJXt:NvxZxRLmeSkB05awb+Tfe25FD9bat
Behavioral task
behavioral1
Sample
52c92275184daa9f8dc3a4363014e89cad297dd91ea965d4a35ab1129bd82b67.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
52c92275184daa9f8dc3a4363014e89cad297dd91ea965d4a35ab1129bd82b67.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
52c92275184daa9f8dc3a4363014e89cad297dd91ea965d4a35ab1129bd82b67
-
Size
80.7MB
-
MD5
c4b288f385a805993ea25e3b0bc9b4f8
-
SHA1
83c57d8d210c8782bc13ee07bfa09a2dec8750a6
-
SHA256
52c92275184daa9f8dc3a4363014e89cad297dd91ea965d4a35ab1129bd82b67
-
SHA512
9b413350eef11d6c70094d5ff4f628f3e21b4ba4def7b388b580fc682993b0ed9deec7317171353244392b3e9377f5450fa8e877235dad534a438f7d4489aee0
-
SSDEEP
1572864:NvxZQglXJdW97vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5Is9bKucJXt:NvxZxRLmeSkB05awb+Tfe25FD9bat
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-