General
-
Target
APIInjector.exe
-
Size
77.4MB
-
Sample
241025-qbvklszdkh
-
MD5
0f2ea71f4f0fda9121a1e19ce444d9ee
-
SHA1
5cda7065eb22ed9032688ea0d885436fee28c87f
-
SHA256
8751f5824a27f1a54ea746495eb8bf015e55c56d1128ca39dab10a2bee112359
-
SHA512
80365949e3eb2f997fdf3906fb09210f5768fae56457cdadfe8db770a0d8f526fdb3a884a4fcca12cbd3afa50ea3659fe4ac2e96150516b7c30856aa7f82881c
-
SSDEEP
1572864:E1l92WWb0ASk8IpG7V+VPhqb+TUE7alhe7fEYiYweyJulZUdgRI6XhR2IUQFgkSB:E1KfSkB05awb+TwLPhpulvXfnFgJB
Behavioral task
behavioral1
Sample
APIInjector.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
APIInjector.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
APIInjector.exe
-
Size
77.4MB
-
MD5
0f2ea71f4f0fda9121a1e19ce444d9ee
-
SHA1
5cda7065eb22ed9032688ea0d885436fee28c87f
-
SHA256
8751f5824a27f1a54ea746495eb8bf015e55c56d1128ca39dab10a2bee112359
-
SHA512
80365949e3eb2f997fdf3906fb09210f5768fae56457cdadfe8db770a0d8f526fdb3a884a4fcca12cbd3afa50ea3659fe4ac2e96150516b7c30856aa7f82881c
-
SSDEEP
1572864:E1l92WWb0ASk8IpG7V+VPhqb+TUE7alhe7fEYiYweyJulZUdgRI6XhR2IUQFgkSB:E1KfSkB05awb+TwLPhpulvXfnFgJB
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-