General
-
Target
source_prepared.exe
-
Size
102.7MB
-
Sample
241020-vef9lsyfnb
-
MD5
c1c5dadb542b478a86d0055515ab14ff
-
SHA1
5e17fb64d722d7488cfc1d6e5aa28900addc0e0f
-
SHA256
10dc063071132d3be140f064aa0c9292eccd00954018505090d89ae445e552cf
-
SHA512
a8f43633e8275fa3ca116061b43cc6544e502d86aa14c665fdfbf16877755369aa3ac1aa2d3f93c2c4f9f132925e1e8b055415d2241829bcaf9ed329232e4163
-
SSDEEP
3145728:pnG9r78S6xjKcBanL2qHO5iVAunGQbRe0zJcBtfZ2:M1ASWNaBHCin1XcBS
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
102.7MB
-
MD5
c1c5dadb542b478a86d0055515ab14ff
-
SHA1
5e17fb64d722d7488cfc1d6e5aa28900addc0e0f
-
SHA256
10dc063071132d3be140f064aa0c9292eccd00954018505090d89ae445e552cf
-
SHA512
a8f43633e8275fa3ca116061b43cc6544e502d86aa14c665fdfbf16877755369aa3ac1aa2d3f93c2c4f9f132925e1e8b055415d2241829bcaf9ed329232e4163
-
SSDEEP
3145728:pnG9r78S6xjKcBanL2qHO5iVAunGQbRe0zJcBtfZ2:M1ASWNaBHCin1XcBS
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-