General
-
Target
source_prepared.exe
-
Size
52.6MB
-
Sample
241003-23tm6svfrf
-
MD5
ccc90b68b6ab4eb7d52276cf864ab9ca
-
SHA1
c8966e76c52779d4453fcf1a78e9331fcc747eab
-
SHA256
5bdedca1d319c244d7b5186b29dd6d1ad725a357e5ad16917e9d363a51059f55
-
SHA512
8b05fec14c4bfd2d4c2447278c62079cdbae35ccc59494b134e36844dffd66dc1efdc45d054a1c7416cc65f7c847224c79b82195f47675c6a15d339bf0615eb5
-
SSDEEP
1572864:BcRlBWLmSk8IpG7V+VPhqFxE7ulhpBBl7+RayyOl:BcRrcmSkB05awFjLpnl7+R93
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
52.6MB
-
MD5
ccc90b68b6ab4eb7d52276cf864ab9ca
-
SHA1
c8966e76c52779d4453fcf1a78e9331fcc747eab
-
SHA256
5bdedca1d319c244d7b5186b29dd6d1ad725a357e5ad16917e9d363a51059f55
-
SHA512
8b05fec14c4bfd2d4c2447278c62079cdbae35ccc59494b134e36844dffd66dc1efdc45d054a1c7416cc65f7c847224c79b82195f47675c6a15d339bf0615eb5
-
SSDEEP
1572864:BcRlBWLmSk8IpG7V+VPhqFxE7ulhpBBl7+RayyOl:BcRrcmSkB05awFjLpnl7+R93
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-