General
-
Target
source_prepared.exe
-
Size
81.5MB
-
Sample
240824-1lra2staqk
-
MD5
ad5090ca9dff05d772965bcce8cdeca0
-
SHA1
661fcc50aff5ea4edc5deeb1796bf40d77c2a798
-
SHA256
d70d3840a385381f3958417e0b38479b98336c837185831eb251a97b19405bdc
-
SHA512
df7bc42ffafc61a305411f8bdde46261242a6bdbc768f089946343b0e844751fc7daf9b4d2fbd1b9be67d61d7c1a38c7b86494110a2da7b62524b9907df7a826
-
SSDEEP
1572864:fvxZQglXJdWj7vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5I29vWZcJXt:fvxZxRLmeSkB05awb+Tfe25Fx9vDt
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
81.5MB
-
MD5
ad5090ca9dff05d772965bcce8cdeca0
-
SHA1
661fcc50aff5ea4edc5deeb1796bf40d77c2a798
-
SHA256
d70d3840a385381f3958417e0b38479b98336c837185831eb251a97b19405bdc
-
SHA512
df7bc42ffafc61a305411f8bdde46261242a6bdbc768f089946343b0e844751fc7daf9b4d2fbd1b9be67d61d7c1a38c7b86494110a2da7b62524b9907df7a826
-
SSDEEP
1572864:fvxZQglXJdWj7vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5I29vWZcJXt:fvxZxRLmeSkB05awb+Tfe25Fx9vDt
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1