General
-
Target
Celex Cracked Credits Runtz.zip
-
Size
76.2MB
-
Sample
240903-fyjfraxhnk
-
MD5
0219d0d9b1cf092f7ed15b7737c1ad16
-
SHA1
3d6ae3312656815fb4a42289c552cd311d30c5b9
-
SHA256
b5549b15a70bd190fd658ce5e11c97fe54075bbb06f4ec5c393c3aa8cf2aaed3
-
SHA512
6a2fbb98064380516b66f9a7e9654fc7a4183242527282dd55d08c92670f7444219ec4c6c7e560f88ff1e4c2ca1fdcbb5f660a63d07eb5c71d11dfb3bc53e7c7
-
SSDEEP
1572864:8GcnmEHI8I8KPv+FDq/Jn9DPbUNqmnrgtB2/EY8QhIjK5mMr6JNX7xi:8GcHqPgoJnxGgtBCECHj6vXVi
Behavioral task
behavioral1
Sample
Celex Cracked Credits Runtz/CelexCracked By Runtz.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Celex Cracked Credits Runtz/CelexCracked By Runtz.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Celex Cracked Credits Runtz/CelexCracked By Runtz.exe
-
Size
76.5MB
-
MD5
c32e966fc462555c5d1eaf1aeb30dbfc
-
SHA1
ff1b7bf4d4d29fd00b8d1087b39ecd0edf63e11c
-
SHA256
69c81c3157acf3147df7a3aef82432dfc76d24ca7aafe2c34a24bb4bb196ab02
-
SHA512
bde9dc630cb75c30161e377c42c56ea11404aec30f468d27924141f1fc85ebd2a7402efe72d3b729dc3379dc4ec47d42c22866fdb56fd1e35533e5dc7e1329a4
-
SSDEEP
1572864:pvhQ6l1WF7vDSk8IpG7V+VPhqS0E7WTylPDDiY4MHHLeqPNLtD6qIZ0Awf:pvh1vKPSkB05awSgTy5IMHVLt+3Nwf
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-