General
-
Target
PepperX.exe
-
Size
76.8MB
-
Sample
240819-bcwfzavfmf
-
MD5
f1bc39b4e64cb51e38cc5b151567e6e2
-
SHA1
49c9112f7ef8a0636f98f8749e99af62eab74f0d
-
SHA256
0b3cf24c45d3e6b30b9b87c66a23d3f1fe40fea37dd7ed8116507e00bf21198f
-
SHA512
19e8325be9532c3d5086bd783af59ebac877656866bb07fe28b6b289e2829030d0428447bedbdf43fae337e510691f85879951bf439fda882ca504ef043b3827
-
SSDEEP
1572864:YvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h9rFfEpV37U:YvHcRYQhTSkB05awcfLdMpuyh9r5Wo
Behavioral task
behavioral1
Sample
PepperX.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
PepperX.exe
-
Size
76.8MB
-
MD5
f1bc39b4e64cb51e38cc5b151567e6e2
-
SHA1
49c9112f7ef8a0636f98f8749e99af62eab74f0d
-
SHA256
0b3cf24c45d3e6b30b9b87c66a23d3f1fe40fea37dd7ed8116507e00bf21198f
-
SHA512
19e8325be9532c3d5086bd783af59ebac877656866bb07fe28b6b289e2829030d0428447bedbdf43fae337e510691f85879951bf439fda882ca504ef043b3827
-
SSDEEP
1572864:YvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h9rFfEpV37U:YvHcRYQhTSkB05awcfLdMpuyh9r5Wo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-