General
-
Target
madeinwindows.exe
-
Size
74.5MB
-
Sample
240930-xeq5xstfna
-
MD5
7a65beb6edc153af3126ed933dbae7e4
-
SHA1
ff5491b526ef8f91719737971bf908cdc2075e3c
-
SHA256
c3e56e388d992bfed1ed7ab2db686aa4b06ea501c44ddc4be757ba6c265f08d9
-
SHA512
455edeca0af7873675c27d8c614938da04db46f86f0690bf5fa8477a65c70f1011757d617bcf91c99162e87b7c2ae1d6dfb5994f7d71fec129c418caf44e1d30
-
SSDEEP
1572864:fvHcRlnWNSk8IpG7V+VPhqFxE7ulhpBBPiYweyJulZUdgD7IAtyyOlPH1O3:fvHcRVYSkB05awFjLpnApu/7IAs3tO3
Behavioral task
behavioral1
Sample
madeinwindows.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
madeinwindows.exe
-
Size
74.5MB
-
MD5
7a65beb6edc153af3126ed933dbae7e4
-
SHA1
ff5491b526ef8f91719737971bf908cdc2075e3c
-
SHA256
c3e56e388d992bfed1ed7ab2db686aa4b06ea501c44ddc4be757ba6c265f08d9
-
SHA512
455edeca0af7873675c27d8c614938da04db46f86f0690bf5fa8477a65c70f1011757d617bcf91c99162e87b7c2ae1d6dfb5994f7d71fec129c418caf44e1d30
-
SSDEEP
1572864:fvHcRlnWNSk8IpG7V+VPhqFxE7ulhpBBPiYweyJulZUdgD7IAtyyOlPH1O3:fvHcRVYSkB05awFjLpnApu/7IAs3tO3
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-