General
-
Target
Bloxy.exe
-
Size
76.6MB
-
Sample
241002-bx9t4athre
-
MD5
09b56a741cc2cd996b6f6e511c22de17
-
SHA1
82bfe409baabfba667bf2959c0bca06183dff983
-
SHA256
e35bd1073ca8065d86590bbf20fce026e39f2206d7d9ccadd4b271f197c0bfbe
-
SHA512
0d20c11bb5dd88cad05a35fe4ed0c8916dfd64f2e710eab5c0588548902d32e8861864257ebf1160cbf1d5edec8e082e562084834af91eef48aa4faaf8ba9940
-
SSDEEP
1572864:WwvHcRlYSk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgAdW4zjtux3a/Z9U:WwvHcRqSkB05awcfhdCpukdRPA49U
Behavioral task
behavioral1
Sample
Bloxy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bloxy.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Bloxy.exe
-
Size
76.6MB
-
MD5
09b56a741cc2cd996b6f6e511c22de17
-
SHA1
82bfe409baabfba667bf2959c0bca06183dff983
-
SHA256
e35bd1073ca8065d86590bbf20fce026e39f2206d7d9ccadd4b271f197c0bfbe
-
SHA512
0d20c11bb5dd88cad05a35fe4ed0c8916dfd64f2e710eab5c0588548902d32e8861864257ebf1160cbf1d5edec8e082e562084834af91eef48aa4faaf8ba9940
-
SSDEEP
1572864:WwvHcRlYSk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgAdW4zjtux3a/Z9U:WwvHcRqSkB05awcfhdCpukdRPA49U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-