General
-
Target
Ddos.exe
-
Size
77.4MB
-
Sample
241021-nchaka1gmd
-
MD5
2b759dcfb04fef5702ee2814dfde90d8
-
SHA1
b76264260e10ae8e739d906381b7b64f9d456099
-
SHA256
349fede20eee93a978b791639a0ae230876e449a37077addc73c13fa04ed01ac
-
SHA512
c61fd48115c04e38364e5c2979d05580d1a750b885e50228e0f1f59f1a7dbf6d3d3bb24619b6fe6fd1aacf0288d14945fa1f5995156fe187f746a66f0ff0c2bc
-
SSDEEP
1572864:+1l9Wd30ASk8IpG7V+VPhqYdfzE7ElhTRiYweyJulZUdgkhe40jSlV3mDV:+1HkSkB05awcfHLapuQhyMqV
Behavioral task
behavioral1
Sample
Ddos.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ddos.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Ddos.exe
-
Size
77.4MB
-
MD5
2b759dcfb04fef5702ee2814dfde90d8
-
SHA1
b76264260e10ae8e739d906381b7b64f9d456099
-
SHA256
349fede20eee93a978b791639a0ae230876e449a37077addc73c13fa04ed01ac
-
SHA512
c61fd48115c04e38364e5c2979d05580d1a750b885e50228e0f1f59f1a7dbf6d3d3bb24619b6fe6fd1aacf0288d14945fa1f5995156fe187f746a66f0ff0c2bc
-
SSDEEP
1572864:+1l9Wd30ASk8IpG7V+VPhqYdfzE7ElhTRiYweyJulZUdgkhe40jSlV3mDV:+1HkSkB05awcfHLapuQhyMqV
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1