General
-
Target
Pysil.zip
-
Size
76.7MB
-
Sample
240819-mk3qsssdqk
-
MD5
a200b39d9bf4974d4eccd3d8920d55b5
-
SHA1
47ce404e814c46f2b829809156db742248395846
-
SHA256
174436f54900cc5e0791f47bd70444dcf46ae9cec1d55a04776ddfe37ff9e3d4
-
SHA512
1964bb4bfb800920b968283e9bd79bdabc3ab00a5c98cf7151d980190d0d06b930c5c19e4e0e2f5a943c9a7878425ff38e5442a8fa5bb772458a15e50b483af1
-
SSDEEP
1572864:ZBsk+78FPdD3DiW0clSjH4Hj9EDwfs5CtW8Wttsaseux/rwiTPHrtcrm3fviyP:ZBs3gFPd/iW1UbQiEkl8WjZuxFHrOyHX
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
77.1MB
-
MD5
c630bfc590d34139bce713a9f588173d
-
SHA1
6c63c331bd54db755a1a1342b2b89b1ffde6f3a8
-
SHA256
5d7b8fccb2dd56566c6b72ff868264c605eee3175ac30eb0214146db1ced86eb
-
SHA512
a2819599c97b349912a7a0b1b6f3c0c047598c16980ca31cef487c10bbae591108b291769b7ce4ddf88b328863f5319be40de6d0750f76808a802e6f529836df
-
SSDEEP
1572864:BvhQ6lNWeoC7vDSk8IpG7V+VPhqqg5NbE7W8ylPj4iY4MHHLeqPNLtDaoRZrvGH:Bvh1f1oCPSkB05awBzx8y5nMHVLteQ9U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1