General
-
Target
GL6.exe
-
Size
76.8MB
-
Sample
240901-2vse5stgqq
-
MD5
f61b56b51ee3c700db9d82c2150b69e7
-
SHA1
9517322c567b90cd992ba8840e4cf1634378e75a
-
SHA256
c05f6a5821655fc7968d3fccf822ec24ccfb0c853c14200fd013f76f06332a42
-
SHA512
ec4851acdd79b4b72f5ff61325c78eacb770ff76cfa18c27f8b7bff424d623a162e542fab3f74ebf9968695dbf5e81007b344000aa111e08148a6ef6ae3e2b23
-
SSDEEP
1572864:bvHcRlKWKh7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghh9reDEjV37U:bvHcRYxhTSkB05awcfLdMpuFh9rOQo
Behavioral task
behavioral1
Sample
GL6.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
GL6.exe
-
Size
76.8MB
-
MD5
f61b56b51ee3c700db9d82c2150b69e7
-
SHA1
9517322c567b90cd992ba8840e4cf1634378e75a
-
SHA256
c05f6a5821655fc7968d3fccf822ec24ccfb0c853c14200fd013f76f06332a42
-
SHA512
ec4851acdd79b4b72f5ff61325c78eacb770ff76cfa18c27f8b7bff424d623a162e542fab3f74ebf9968695dbf5e81007b344000aa111e08148a6ef6ae3e2b23
-
SSDEEP
1572864:bvHcRlKWKh7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghh9reDEjV37U:bvHcRYxhTSkB05awcfLdMpuFh9rOQo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-