General
-
Target
source_prepared.exe
-
Size
76.8MB
-
Sample
240901-z5g12ssfjc
-
MD5
c24da726de1857ee810438c9006f71e7
-
SHA1
8adc37065c914bbe3dc782ff5f1ac6c737198982
-
SHA256
6f8f7a76109519aea3eceb2a13386e3ec5126a4a7ff53b5316a0eb92764fc30b
-
SHA512
18a41d8c7092b539273deed31cbd31660baf70fc8ef71cf21b87b9c21fe5d720f60da02e65182ccbc8e9379b68a56e2cc7709c7416228f73da6e1f65911d3ffc
-
SSDEEP
1572864:xvHcRlKWKh7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghh9reDEjV37U:xvHcRYxhTSkB05awcfLdMpuFh9rOQo
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
76.8MB
-
MD5
c24da726de1857ee810438c9006f71e7
-
SHA1
8adc37065c914bbe3dc782ff5f1ac6c737198982
-
SHA256
6f8f7a76109519aea3eceb2a13386e3ec5126a4a7ff53b5316a0eb92764fc30b
-
SHA512
18a41d8c7092b539273deed31cbd31660baf70fc8ef71cf21b87b9c21fe5d720f60da02e65182ccbc8e9379b68a56e2cc7709c7416228f73da6e1f65911d3ffc
-
SSDEEP
1572864:xvHcRlKWKh7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghh9reDEjV37U:xvHcRYxhTSkB05awcfLdMpuFh9rOQo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-