General
-
Target
source_prepared.exe
-
Size
55.8MB
-
Sample
240816-12a9rstdlj
-
MD5
f555c2123c9b86ca73675b4400aa738d
-
SHA1
ca1d37c5e9ee7b9c385fb5323d7ddb70d06fcfe2
-
SHA256
85164652be29d6f6fe15cdda45a35da51ffed536a4b147857d0516d9be177f0c
-
SHA512
a7341c1ec9c2b0f0c656626406ece5e4d44b5897ee0516ce89fbcd9e5b8c14d02bec61e88720296406345d1e3932ada068c4eddf07fd9f6b2144af02fdb960fe
-
SSDEEP
1572864:YvxZQgl3WL47vaSk8IpG7V+VPhqcPE7hl/090CRr:YvxZxhzeSkB05awcSZ090ir
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
55.8MB
-
MD5
f555c2123c9b86ca73675b4400aa738d
-
SHA1
ca1d37c5e9ee7b9c385fb5323d7ddb70d06fcfe2
-
SHA256
85164652be29d6f6fe15cdda45a35da51ffed536a4b147857d0516d9be177f0c
-
SHA512
a7341c1ec9c2b0f0c656626406ece5e4d44b5897ee0516ce89fbcd9e5b8c14d02bec61e88720296406345d1e3932ada068c4eddf07fd9f6b2144af02fdb960fe
-
SSDEEP
1572864:YvxZQgl3WL47vaSk8IpG7V+VPhqcPE7hl/090CRr:YvxZxhzeSkB05awcSZ090ir
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-