General
-
Target
release 2.21v.rar
-
Size
79.9MB
-
Sample
240829-v7k39svepm
-
MD5
cbca16a30d933481b2b42ad9ebf04e6c
-
SHA1
68a9ead8c6c56bf8796a7c8483f3870f566696cd
-
SHA256
3953661397d96baa773cf45497e1f8216046663172924fed0c8f0fc5b32bc18c
-
SHA512
fa1656511758a4edeaea838d3847cd8f588aeafe72557fb0ea442418c874bd117945e2cdc642173d96471d7d418f20d603ae21a91b48c20abcc3fdc758b99c29
-
SSDEEP
1572864:Xf54DKqY0wZE3HMkvfuT0m0IcAZmu94KqPyaBL94xDT7vgUA33ZtW:hGKr+XBO70vu94FIDT7vBA5o
Behavioral task
behavioral1
Sample
RUES.EXTv2.13v.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RUES.EXTv2.13v.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
RUES.EXTv2.13v.exe
-
Size
76.8MB
-
MD5
53fa6aaa2bf0fa8ff39523e41762a4b5
-
SHA1
031420d84303cc0764a78e4b6c562d2e0ae09fbf
-
SHA256
0faa6e0066477085639fe21d56f8f64d43d32bce9ceb6cfda00d9e08332667d6
-
SHA512
f3bace1297a80459d0f995eb49fdfc1a5fc5c9171e60d3f44423f4bfc2564d21bb291c9f05906b3d7e3b51b5a67a50dc4ed328553faded5be769dabe78fb8a9f
-
SSDEEP
1572864:IvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghhCreDEjV37U:IvHcRY6hTSkB05awcfLdMpuFhCrOQo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-