General
-
Target
source_prepared.exe
-
Size
76.9MB
-
Sample
241005-yjhvsa1apq
-
MD5
dd3bc921aa13e4f688728ed3a30e31e6
-
SHA1
6950458ff0824906ee4b3879fcaa28148fa83c28
-
SHA256
a23ff56529e52f79e70a209109e818c99c68a73a9bdb3eccf5114844bcd543ab
-
SHA512
6bafbe3421919e1d941ee07155a07ec1a216ab4cd48af3ee2b67ec60d671ebe38e2738308efe358755da8e74e186507b1ac6cb00fcee8ab68fa660f7d351b664
-
SSDEEP
1572864:McRlAWImSk8IpG7V+VPhqFxE7ulh8qfiYweyJulZUdgq4+FBd72:McRWPmSkB05awFfLKpuG4kZ2
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
76.9MB
-
MD5
dd3bc921aa13e4f688728ed3a30e31e6
-
SHA1
6950458ff0824906ee4b3879fcaa28148fa83c28
-
SHA256
a23ff56529e52f79e70a209109e818c99c68a73a9bdb3eccf5114844bcd543ab
-
SHA512
6bafbe3421919e1d941ee07155a07ec1a216ab4cd48af3ee2b67ec60d671ebe38e2738308efe358755da8e74e186507b1ac6cb00fcee8ab68fa660f7d351b664
-
SSDEEP
1572864:McRlAWImSk8IpG7V+VPhqFxE7ulh8qfiYweyJulZUdgq4+FBd72:McRWPmSkB05awFfLKpuG4kZ2
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-