Resubmissions
28-09-2024 07:33
240928-jdxpestepp 10General
-
Target
da.exe
-
Size
81.1MB
-
Sample
240928-jdxpestepp
-
MD5
657be37fe7dacfc2a9c4cf69c8846318
-
SHA1
8c3a552cd39ad3be0f13c3e0cfb18f7eb99fae81
-
SHA256
6c8ea3e69c8b83e6b0b6b700632ce6a1e6bb2e6b329d72ce52eb89177b963e9f
-
SHA512
1152d651a156216c7342a2fee580cc839a18ef057f5e4ac2f21aa4dfd8e026d6089e3349bd56bce53b5ef4252927a2a01144b8c4ed00eece7ba464979d047544
-
SSDEEP
1572864:yvxZQgldWjRnIZSk8IpG7V+VPhqFiE7jblgwviYgj+h58sMwRTZDK:yvxZxzCnIZSkB05awFTewR5p
Behavioral task
behavioral1
Sample
da.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
da.exe
-
Size
81.1MB
-
MD5
657be37fe7dacfc2a9c4cf69c8846318
-
SHA1
8c3a552cd39ad3be0f13c3e0cfb18f7eb99fae81
-
SHA256
6c8ea3e69c8b83e6b0b6b700632ce6a1e6bb2e6b329d72ce52eb89177b963e9f
-
SHA512
1152d651a156216c7342a2fee580cc839a18ef057f5e4ac2f21aa4dfd8e026d6089e3349bd56bce53b5ef4252927a2a01144b8c4ed00eece7ba464979d047544
-
SSDEEP
1572864:yvxZQgldWjRnIZSk8IpG7V+VPhqFiE7jblgwviYgj+h58sMwRTZDK:yvxZxzCnIZSkB05awFTewR5p
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1