General
-
Target
source_prepared.exe
-
Size
76.8MB
-
Sample
240915-nkbgzs1era
-
MD5
9090e1dde359ea41f04ac8ace4e08284
-
SHA1
74efd24e45265983fbd1b1e7d68288e56565f639
-
SHA256
16ba7a7b16abb7e8f76c5141af5b52ad72c70c606dc5949ab9b9a993992c1fd6
-
SHA512
cb74275329b6822f33b49c2f8cb64117f22a3a3105978d776fe189d1e13c348700036652bfa5a2eace1441a63ebc3463ebe204775f1a5a32b1df8fbf59545745
-
SSDEEP
1572864:u5vHcRlnWUmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdg77a3ay4vlqH1O3p:u5vHcRVLmSkB05awFjdQnApuf7a39Occ
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
76.8MB
-
MD5
9090e1dde359ea41f04ac8ace4e08284
-
SHA1
74efd24e45265983fbd1b1e7d68288e56565f639
-
SHA256
16ba7a7b16abb7e8f76c5141af5b52ad72c70c606dc5949ab9b9a993992c1fd6
-
SHA512
cb74275329b6822f33b49c2f8cb64117f22a3a3105978d776fe189d1e13c348700036652bfa5a2eace1441a63ebc3463ebe204775f1a5a32b1df8fbf59545745
-
SSDEEP
1572864:u5vHcRlnWUmSk8IpG7V+VPhqFxE7ulHQBBPiYweyJulZUdg77a3ay4vlqH1O3p:u5vHcRVLmSkB05awFjdQnApuf7a39Occ
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-