General
-
Target
this is a rat.exe
-
Size
77.6MB
-
Sample
240929-pmh6aavajj
-
MD5
8beb09cc1fdd9f2186ee7ac058191b00
-
SHA1
4c3cc95c76a394176283a36190fa6654d9513044
-
SHA256
a34327424dca7fbce87fb6ea5c67d1c31f818ecf6d27ba81b691dab35a356634
-
SHA512
9bc782e32f2e95c59d4ca80f84e51a06b689ee8e3e829c8415719d59a0fd710651a53641a46d6a42140bd4f16698d408d80f553e5062bc4b33e685e12f80abf8
-
SSDEEP
1572864:GvHcRldWpmSk8IpG7V+VPhqYdfzE7FFlhqziYweyJulZUdgK3BuOJ/Z9UT:GvHcRjOmSkB05awcf8L9pu+3E29U
Behavioral task
behavioral1
Sample
this is a rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
this is a rat.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
this is a rat.exe
-
Size
77.6MB
-
MD5
8beb09cc1fdd9f2186ee7ac058191b00
-
SHA1
4c3cc95c76a394176283a36190fa6654d9513044
-
SHA256
a34327424dca7fbce87fb6ea5c67d1c31f818ecf6d27ba81b691dab35a356634
-
SHA512
9bc782e32f2e95c59d4ca80f84e51a06b689ee8e3e829c8415719d59a0fd710651a53641a46d6a42140bd4f16698d408d80f553e5062bc4b33e685e12f80abf8
-
SSDEEP
1572864:GvHcRldWpmSk8IpG7V+VPhqYdfzE7FFlhqziYweyJulZUdgK3BuOJ/Z9UT:GvHcRjOmSkB05awcf8L9pu+3E29U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1