General
-
Target
PepperX.exe
-
Size
76.8MB
-
Sample
240817-2z72dsvdnj
-
MD5
d0ea588f3783eefb7314426effdb468f
-
SHA1
1c24abc54da6555923f481da92ccda8c11a95c1d
-
SHA256
ed1477fa6d1db3dd075261632e9c3fa3dd05205607e039941d18a9945aeecb56
-
SHA512
d7ff3f59429ec73af94f8140da2213497dd35b36a5ac2d1f56833aada62fc279d580b8ecc7f1260b9e228c00ded65ed6946d6ed94a6177c6e193169d6990d0d8
-
SSDEEP
1572864:VvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h9rFfEpV37U:VvHcRYQhTSkB05awcfLdMpuyh9r5Wo
Behavioral task
behavioral1
Sample
PepperX.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PepperX.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
PepperX.exe
-
Size
76.8MB
-
MD5
d0ea588f3783eefb7314426effdb468f
-
SHA1
1c24abc54da6555923f481da92ccda8c11a95c1d
-
SHA256
ed1477fa6d1db3dd075261632e9c3fa3dd05205607e039941d18a9945aeecb56
-
SHA512
d7ff3f59429ec73af94f8140da2213497dd35b36a5ac2d1f56833aada62fc279d580b8ecc7f1260b9e228c00ded65ed6946d6ed94a6177c6e193169d6990d0d8
-
SSDEEP
1572864:VvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h9rFfEpV37U:VvHcRYQhTSkB05awcfLdMpuyh9r5Wo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1