General
-
Target
molly.exe
-
Size
38.2MB
-
Sample
241106-fdwwcatqds
-
MD5
f361fbc974343a2e2d95b04aa894dba0
-
SHA1
3511a88e9664ae8959023aa1751492802fc5272b
-
SHA256
a11cb75b49e9db9c83882cf7dc755e53cd1ed653f7560b8448dfc2061b9b3197
-
SHA512
3539e51331f7abb044c01eb8662e8a5174cbc37a1cce38f09070adcc3235be63b1a7ab98607f96987069d980ac1c52dfaffdeca2131b1ef55b0e4e7fe918ac59
-
SSDEEP
786432:iVl8ZGKlp+W8SindbTObzcY87HC5hlynXTxfmvgCglDWxiLwJDi:VGKlcWpcdfmE7cliRyAlD9C
Behavioral task
behavioral1
Sample
molly.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
molly.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
molly.exe
-
Size
38.2MB
-
MD5
f361fbc974343a2e2d95b04aa894dba0
-
SHA1
3511a88e9664ae8959023aa1751492802fc5272b
-
SHA256
a11cb75b49e9db9c83882cf7dc755e53cd1ed653f7560b8448dfc2061b9b3197
-
SHA512
3539e51331f7abb044c01eb8662e8a5174cbc37a1cce38f09070adcc3235be63b1a7ab98607f96987069d980ac1c52dfaffdeca2131b1ef55b0e4e7fe918ac59
-
SSDEEP
786432:iVl8ZGKlp+W8SindbTObzcY87HC5hlynXTxfmvgCglDWxiLwJDi:VGKlcWpcdfmE7cliRyAlD9C
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-