General
-
Target
source_prepared.exe
-
Size
76.8MB
-
Sample
240929-q6vtvszfkg
-
MD5
bf4c26a1f9c449ba0cdc0dfcef64da56
-
SHA1
99815b5bb549e6719a4c0c5968a21700c224054d
-
SHA256
d4bd3928bc8a16c9377fdebf15da360c6c5c6b07871c7590d43a58a465857558
-
SHA512
83dca20749b0464355f394a01fde09b80f728df8794e05e5820b16d2dfbdb329df3e4ad044786492282f2ca950dce9e4e101644ac7f3169be19274e718b04878
-
SSDEEP
1572864:+vHcRl3WdmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1herRdETV37U:+vHcR50mSkB05awcf2LVpuxherD4o
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
76.8MB
-
MD5
bf4c26a1f9c449ba0cdc0dfcef64da56
-
SHA1
99815b5bb549e6719a4c0c5968a21700c224054d
-
SHA256
d4bd3928bc8a16c9377fdebf15da360c6c5c6b07871c7590d43a58a465857558
-
SHA512
83dca20749b0464355f394a01fde09b80f728df8794e05e5820b16d2dfbdb329df3e4ad044786492282f2ca950dce9e4e101644ac7f3169be19274e718b04878
-
SSDEEP
1572864:+vHcRl3WdmSk8IpG7V+VPhqYdfzE7tlhTgiYweyJulZUdg1herRdETV37U:+vHcR50mSkB05awcf2LVpuxherD4o
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1