General
-
Target
Celery.exe
-
Size
38.9MB
-
Sample
240920-prwbeawfph
-
MD5
1958d56ce89570d458ad70e205129d90
-
SHA1
366cc40327d36b79531e0df984c86a79b1c51858
-
SHA256
8caaad73fde7729f69f2b1eac55aaf7f3b04a5a16e6043eeeb1c4d13539979dc
-
SHA512
0afe2380faf8527bad4c2fa42210de99a69fa6e0e2b082e669b959629b3cea6aa41769244576b3a5e370432bbf13dfe43a90e9eec2ec9419687b9dcb20dfc663
-
SSDEEP
786432:u9Z9xbdQglp8+W8YM67vD7laO45zcY87HC5QlstXcWSK9v9UlQxrP:wvxZQgl3WLp7vwPE7hlgB9lUmr
Behavioral task
behavioral1
Sample
Celery.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Celery.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Celery.exe
-
Size
38.9MB
-
MD5
1958d56ce89570d458ad70e205129d90
-
SHA1
366cc40327d36b79531e0df984c86a79b1c51858
-
SHA256
8caaad73fde7729f69f2b1eac55aaf7f3b04a5a16e6043eeeb1c4d13539979dc
-
SHA512
0afe2380faf8527bad4c2fa42210de99a69fa6e0e2b082e669b959629b3cea6aa41769244576b3a5e370432bbf13dfe43a90e9eec2ec9419687b9dcb20dfc663
-
SSDEEP
786432:u9Z9xbdQglp8+W8YM67vD7laO45zcY87HC5QlstXcWSK9v9UlQxrP:wvxZQgl3WLp7vwPE7hlgB9lUmr
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-