Resubmissions
04-10-2024 22:57
241004-2xcgps1cqq 10General
-
Target
KAZCAR V2.exe
-
Size
106.8MB
-
Sample
241004-2xcgps1cqq
-
MD5
9a29f84f236cc09a78e7a01b8440168d
-
SHA1
bb3035b36da80b44dab9b59032acd2261b6d9306
-
SHA256
d01ee2433402057001532e039343a00c3d46f6680b8842db41555dde7265001e
-
SHA512
25db1bdb2a5222378ac9c566b22ccbcfc59eaf7c82504a32732d2daa66ca1f24f435654f4ef3548495d8acf9fb77c0ee742998fb3f20a97e3a3c1adc415af46b
-
SSDEEP
3145728:jdp4iS6xjKcBa6R2qHO5ir8rPYNO5iIW+3ZYfCv2Q9j8PR:HVSWNa6HHCiVCmfCv24j
Behavioral task
behavioral1
Sample
KAZCAR V2.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
KAZCAR V2.exe
-
Size
106.8MB
-
MD5
9a29f84f236cc09a78e7a01b8440168d
-
SHA1
bb3035b36da80b44dab9b59032acd2261b6d9306
-
SHA256
d01ee2433402057001532e039343a00c3d46f6680b8842db41555dde7265001e
-
SHA512
25db1bdb2a5222378ac9c566b22ccbcfc59eaf7c82504a32732d2daa66ca1f24f435654f4ef3548495d8acf9fb77c0ee742998fb3f20a97e3a3c1adc415af46b
-
SSDEEP
3145728:jdp4iS6xjKcBa6R2qHO5ir8rPYNO5iIW+3ZYfCv2Q9j8PR:HVSWNa6HHCiVCmfCv24j
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-