General
-
Target
rat.exe
-
Size
30.6MB
-
Sample
241009-qc7xbsvenk
-
MD5
dbbfefbdaf205b4b407525aec7fbe773
-
SHA1
d7e7c8a3aca2edf52bdafde4812aa14ab5fb1c66
-
SHA256
09619c6b7f13bb6463bf753ae87c5232b9bca99630fee5d0ebc6edc8a45870f2
-
SHA512
913c043c5a990f79a534d5bf79350592ff1880c8cb84887cde2a6372d52738f175eb42d55455c368e48e6ced8e819b0300c56748b61c563326fdeca0279242fc
-
SSDEEP
786432:rcKwW847XzcY876oBBrW88vWBGeaRAqrT:rcBWFXE7hBB77UeayWT
Malware Config
Targets
-
-
Target
rat.exe
-
Size
30.6MB
-
MD5
dbbfefbdaf205b4b407525aec7fbe773
-
SHA1
d7e7c8a3aca2edf52bdafde4812aa14ab5fb1c66
-
SHA256
09619c6b7f13bb6463bf753ae87c5232b9bca99630fee5d0ebc6edc8a45870f2
-
SHA512
913c043c5a990f79a534d5bf79350592ff1880c8cb84887cde2a6372d52738f175eb42d55455c368e48e6ced8e819b0300c56748b61c563326fdeca0279242fc
-
SSDEEP
786432:rcKwW847XzcY876oBBrW88vWBGeaRAqrT:rcBWFXE7hBB77UeayWT
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-