General
-
Target
Password - 123.rar
-
Size
78.0MB
-
Sample
241105-yclm4axbja
-
MD5
0f391119d689a5a40fe89ce4b9362978
-
SHA1
524da704c241e89e0ee366c65b86889a05c8c6de
-
SHA256
2994940aecec84087c70f40c80af2b1f452ab9990462982f5ce04ba7d182ff0f
-
SHA512
5a9fc2b6ef4f35011abed86405f916a4033345fc5951342d41ccb540bc6c20104c33fb9ca90fa3b4bc85cfa7d80b3e23a360865c9914c9698551bc1c1798dd2d
-
SSDEEP
1572864:X4u+RwAMnb1u6R6zlPjUgopMiAOyR2ymHZ46b0G7x:r++Ru6R6+MhRR27HXb0a
Behavioral task
behavioral1
Sample
Tester/source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Tester/source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Tester/source_prepared.exe
-
Size
81.0MB
-
MD5
230fd80697a343758f1c92fdc5b7e6af
-
SHA1
fad474242d2218c1d82972827e86e904c9ed605f
-
SHA256
b2deb8269ae3d91be9441dcfa7d835223f5b71690122a263305b5a8264b2fab6
-
SHA512
9c35ccc417ec497363e57081265c4b35e4b3a85eace78259234b874bc0a89b941fad6cf872c826689ec6390e61bc075177f27c0e445b2c117ed080287ca03085
-
SSDEEP
1572864:zGKlfWlJ0hSk8IpG7V+VPhqO+ynE77lizHiYgj+h58sMw6erlpIT/cJFgs:6KxEaSkB05awO+yYwV5eerQag
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1