General
-
Target
source_prepared.exe
-
Size
75.6MB
-
Sample
240902-a7wvjsxfmd
-
MD5
f81a948a8926fe604b239ceb765d2d0b
-
SHA1
03e7b143ff11ce939cce5dceb7916724824a67dd
-
SHA256
1a83662587f1330b2c0bdd89ac09b577123809f47e71688bd1ad0bbb2c0b0a05
-
SHA512
0e9c32964c5c01a2c2cae3ab1438203f69040775fd0e56c38a56640b75bcd77dc3c39f20731686240720247e81451e3c175794986f797d1291b8d2d71323a88e
-
SSDEEP
1572864:FvhQ6lNW47vDSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDahBZnwZx:Fvh1fjPSkB05awIxTy5nMHVLterGZx
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
75.6MB
-
MD5
f81a948a8926fe604b239ceb765d2d0b
-
SHA1
03e7b143ff11ce939cce5dceb7916724824a67dd
-
SHA256
1a83662587f1330b2c0bdd89ac09b577123809f47e71688bd1ad0bbb2c0b0a05
-
SHA512
0e9c32964c5c01a2c2cae3ab1438203f69040775fd0e56c38a56640b75bcd77dc3c39f20731686240720247e81451e3c175794986f797d1291b8d2d71323a88e
-
SSDEEP
1572864:FvhQ6lNW47vDSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDahBZnwZx:Fvh1fjPSkB05awIxTy5nMHVLterGZx
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1