General
-
Target
2b3088582fd4cf49f53537ebbb845a79891b68facef88fda0ace6901e79d4207
-
Size
75.7MB
-
Sample
240913-y2fs5sxcja
-
MD5
2126949eaa05d623c4395534c24af5e0
-
SHA1
fe6bc25e5c101c57ad8306a19e2db19719ac219c
-
SHA256
2b3088582fd4cf49f53537ebbb845a79891b68facef88fda0ace6901e79d4207
-
SHA512
1f4d53c72568ca4c43cdab581cfc2d4dae3c58c434140cb7b2e9401491dfc9968e609e0df82e48b5f22cd7d8044a0077c58434526f062d7333a79922fcbcc5c3
-
SSDEEP
1572864:avhQ6lkWIKWSk8IpG7V+VPhqSvE7WTylPDDiY4MHHLeqPNLtD5gpZrKLT:avh1ulKWSkB05awStTy5IMHVLt1akLT
Behavioral task
behavioral1
Sample
2b3088582fd4cf49f53537ebbb845a79891b68facef88fda0ace6901e79d4207.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b3088582fd4cf49f53537ebbb845a79891b68facef88fda0ace6901e79d4207.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2b3088582fd4cf49f53537ebbb845a79891b68facef88fda0ace6901e79d4207
-
Size
75.7MB
-
MD5
2126949eaa05d623c4395534c24af5e0
-
SHA1
fe6bc25e5c101c57ad8306a19e2db19719ac219c
-
SHA256
2b3088582fd4cf49f53537ebbb845a79891b68facef88fda0ace6901e79d4207
-
SHA512
1f4d53c72568ca4c43cdab581cfc2d4dae3c58c434140cb7b2e9401491dfc9968e609e0df82e48b5f22cd7d8044a0077c58434526f062d7333a79922fcbcc5c3
-
SSDEEP
1572864:avhQ6lkWIKWSk8IpG7V+VPhqSvE7WTylPDDiY4MHHLeqPNLtD5gpZrKLT:avh1ulKWSkB05awStTy5IMHVLt1akLT
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-