General
-
Target
b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb.exe
-
Size
81.1MB
-
Sample
241011-12yp3awgnf
-
MD5
f7816fb09d8d8e6b166ef851678b9eb2
-
SHA1
652a89d9f90ff200dbb3e0ca2a868a87f86f4c40
-
SHA256
b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb
-
SHA512
b22d019dfb72d3db8c7020901f59bc44e2c129c8f2ed099a0b56105a42f0ffc48d66ace7f80ef1d1c3f3261a822fc4fdba1d72793fe9ba36eca6237610df0512
-
SSDEEP
1572864:uvlQ3jewiESk8IpG7V+VPhqArYE7mjCNtOWB/4PcPJKW59ObbP1g5:uvl+CTESkB05awArMu/dB/YcPsS9O3Pq
Behavioral task
behavioral1
Sample
b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb.exe
-
Size
81.1MB
-
MD5
f7816fb09d8d8e6b166ef851678b9eb2
-
SHA1
652a89d9f90ff200dbb3e0ca2a868a87f86f4c40
-
SHA256
b2474e75aa1c5063e02f9579101c10477596d767fba09de0a10d8a9aa22f6bbb
-
SHA512
b22d019dfb72d3db8c7020901f59bc44e2c129c8f2ed099a0b56105a42f0ffc48d66ace7f80ef1d1c3f3261a822fc4fdba1d72793fe9ba36eca6237610df0512
-
SSDEEP
1572864:uvlQ3jewiESk8IpG7V+VPhqArYE7mjCNtOWB/4PcPJKW59ObbP1g5:uvl+CTESkB05awArMu/dB/YcPsS9O3Pq
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-