General
-
Target
OpenIfUDare.exe
-
Size
72.4MB
-
Sample
241029-cy78bs1jfp
-
MD5
bf3976be4eee6b590572c4968366d2d4
-
SHA1
25b5c71487b71110fed30921144d1f1bc0e36a18
-
SHA256
30ee1d5e1de95363127d894fb845037f730c810da7bed37d4c7f20a0602b5f03
-
SHA512
e28625fdff70014e90121c75e5b7c92f63b2200acfd258ff7ac12e625413c4f332423b8c5211ae892c6e1ac2244a52eaf1721d9bb316b60d4764f548c113c9ca
-
SSDEEP
1572864:+9JxSm1Wh3hr7acirAH8+1osuTCSxOB6xMLiIpB2qHWB75ilQCmqZ8++yAmDSt:KzAr7RS6xjKcBa6/2qHO5iFpy++yz2
Behavioral task
behavioral1
Sample
OpenIfUDare.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
OpenIfUDare.exe
-
Size
72.4MB
-
MD5
bf3976be4eee6b590572c4968366d2d4
-
SHA1
25b5c71487b71110fed30921144d1f1bc0e36a18
-
SHA256
30ee1d5e1de95363127d894fb845037f730c810da7bed37d4c7f20a0602b5f03
-
SHA512
e28625fdff70014e90121c75e5b7c92f63b2200acfd258ff7ac12e625413c4f332423b8c5211ae892c6e1ac2244a52eaf1721d9bb316b60d4764f548c113c9ca
-
SSDEEP
1572864:+9JxSm1Wh3hr7acirAH8+1osuTCSxOB6xMLiIpB2qHWB75ilQCmqZ8++yAmDSt:KzAr7RS6xjKcBa6/2qHO5iFpy++yz2
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-