General
-
Target
test.exe
-
Size
77.6MB
-
Sample
240930-2bgjjaxhlr
-
MD5
806a01d82b183bf7ab1c82a9ccbdde35
-
SHA1
82b55d119d418b51b2f67c6fd49604ac8ed6e434
-
SHA256
43f25b20b48abc54a04a8857dbd59b0ae395681509c00d767dffcfc3111cd227
-
SHA512
f656510879df9747e88455a496c39b331b8d5b56b7ef383328083b0f263ba3bfda801a70717c31abc194a6fd733f36e8b2d925fcbaa41b8537b000062ac416d9
-
SSDEEP
1572864:fvHcRlnWSmSk8IpG7V+VPhqFxE7ulSpBBPiYweyJulZUdgD7UwayyOliH1O3:fvHcRVhmSkB05awFj8pnApu/7Uw93kO3
Behavioral task
behavioral1
Sample
test.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
test.exe
-
Size
77.6MB
-
MD5
806a01d82b183bf7ab1c82a9ccbdde35
-
SHA1
82b55d119d418b51b2f67c6fd49604ac8ed6e434
-
SHA256
43f25b20b48abc54a04a8857dbd59b0ae395681509c00d767dffcfc3111cd227
-
SHA512
f656510879df9747e88455a496c39b331b8d5b56b7ef383328083b0f263ba3bfda801a70717c31abc194a6fd733f36e8b2d925fcbaa41b8537b000062ac416d9
-
SSDEEP
1572864:fvHcRlnWSmSk8IpG7V+VPhqFxE7ulSpBBPiYweyJulZUdgD7UwayyOliH1O3:fvHcRVhmSkB05awFj8pnApu/7Uw93kO3
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1