General
-
Target
celex.exe
-
Size
52.0MB
-
Sample
241015-yvcg5sydkn
-
MD5
e9c6a2e8f813b251d3440373507c0e09
-
SHA1
fe921a72b4a65dfa5db5789e3a5e04a3247c6d99
-
SHA256
3c51f1e36b4a777eb65f472bb14109929bb2c637a2e3f9d8f568f1a7a978b38d
-
SHA512
2ef5450ab7c5e93219b979e021feb386d55bdd19b676403512f7536133022128534a001ed573faa34d4a65547ab19792d8bc447c05a5642a106a5bafbc9e1b72
-
SSDEEP
1572864:yVl6W/QWSk8IpG7V+VPhqSvE7WAylKNVNoq0Z2vr:YYsQWSkB05awStAyMzNV0wr
Behavioral task
behavioral1
Sample
celex.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
celex.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
celex.exe
-
Size
52.0MB
-
MD5
e9c6a2e8f813b251d3440373507c0e09
-
SHA1
fe921a72b4a65dfa5db5789e3a5e04a3247c6d99
-
SHA256
3c51f1e36b4a777eb65f472bb14109929bb2c637a2e3f9d8f568f1a7a978b38d
-
SHA512
2ef5450ab7c5e93219b979e021feb386d55bdd19b676403512f7536133022128534a001ed573faa34d4a65547ab19792d8bc447c05a5642a106a5bafbc9e1b72
-
SSDEEP
1572864:yVl6W/QWSk8IpG7V+VPhqSvE7WAylKNVNoq0Z2vr:YYsQWSkB05awStAyMzNV0wr
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-