General
-
Target
AntiDoxx.exe
-
Size
76.7MB
-
Sample
241027-r3c1baycqa
-
MD5
827faa2d40d6dff0be38c9a2f8df2cf3
-
SHA1
21185423a6b373901ca1e85c9cee441975136051
-
SHA256
c862b103141b57e9dc6aeeed6043ec5c8b6f7333ed28cdeaaa02d87c158af5d3
-
SHA512
bef648836b73eee03cdb4aa1ad746f1b2ef71cedf7ce05948586b63bd44db83eed529cfcc58c9216b93b056cdc325503b1166a27eea784fde3b24cc1d5e4abae
-
SSDEEP
1572864:a8VlOWj0sSk8IpG7V+VPhqSvE7WCylKN0iY4MHHLeqPNLtD5ZsgqZ0t0k:aKYASkB05awStCyMZMHVLt1Z5qK0k
Behavioral task
behavioral1
Sample
AntiDoxx.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
AntiDoxx.exe
-
Size
76.7MB
-
MD5
827faa2d40d6dff0be38c9a2f8df2cf3
-
SHA1
21185423a6b373901ca1e85c9cee441975136051
-
SHA256
c862b103141b57e9dc6aeeed6043ec5c8b6f7333ed28cdeaaa02d87c158af5d3
-
SHA512
bef648836b73eee03cdb4aa1ad746f1b2ef71cedf7ce05948586b63bd44db83eed529cfcc58c9216b93b056cdc325503b1166a27eea784fde3b24cc1d5e4abae
-
SSDEEP
1572864:a8VlOWj0sSk8IpG7V+VPhqSvE7WCylKN0iY4MHHLeqPNLtD5ZsgqZ0t0k:aKYASkB05awStCyMZMHVLt1Z5qK0k
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-