General
-
Target
source_prepared.exe
-
Size
80.8MB
-
Sample
240913-31nvkswhqf
-
MD5
fef73e8c37ea0c02651096727ff705e5
-
SHA1
e85e1ab9559bc8851632eff732d398dbb283e215
-
SHA256
ac93a406c0e09c48e2d813e1286cf8ecd7857c39958875bb6290c73726f0570c
-
SHA512
70de12a8f0cb447d4ed1f876e98a4099fd172fea8618a817def48342159fef19bcf2740550242f61d6801980140c67932db85553bc1eb0ebec49aaa8a21a74c5
-
SSDEEP
1572864:LvxZQglo3mWJZSk8IpG7V+VPhqCM3E7TlgHtqiYgj+h58sMwx9+i1cJzi:LvxZxeWaZSkB05awCMmeNE5F9+5i
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.8MB
-
MD5
fef73e8c37ea0c02651096727ff705e5
-
SHA1
e85e1ab9559bc8851632eff732d398dbb283e215
-
SHA256
ac93a406c0e09c48e2d813e1286cf8ecd7857c39958875bb6290c73726f0570c
-
SHA512
70de12a8f0cb447d4ed1f876e98a4099fd172fea8618a817def48342159fef19bcf2740550242f61d6801980140c67932db85553bc1eb0ebec49aaa8a21a74c5
-
SSDEEP
1572864:LvxZQglo3mWJZSk8IpG7V+VPhqCM3E7TlgHtqiYgj+h58sMwx9+i1cJzi:LvxZxeWaZSkB05awCMmeNE5F9+5i
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1