General
-
Target
RadiatorBooster.exe
-
Size
77.5MB
-
Sample
241110-vx2y2a1jhv
-
MD5
6114567f8dd82cb30ab76977e1f3e9c2
-
SHA1
a3de50e7037d1fe38e5fe66b4fdc1505ee9fe3e4
-
SHA256
38bc3239b5cf71dc370502c20527717b02ad63ee2948894a447d20839f327939
-
SHA512
4bb4c587d867af56e17fc2856dcb3d19fa8b1e406ceba327c81fb72770fc05bdbe9b442ef4e4247a77684e24905200962d1ce906b18a82e928ae9f84dc519e78
-
SSDEEP
1572864:b1lVW950hSk8IpG7V+VPhqFxE7LlhpBB8iYweyJulZUdgP7Xip5ivMazqvCZH1O3:b1bWySkB05awFeLpnNpur7ZvMsRrO3
Behavioral task
behavioral1
Sample
RadiatorBooster.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RadiatorBooster.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
RadiatorBooster.exe
-
Size
77.5MB
-
MD5
6114567f8dd82cb30ab76977e1f3e9c2
-
SHA1
a3de50e7037d1fe38e5fe66b4fdc1505ee9fe3e4
-
SHA256
38bc3239b5cf71dc370502c20527717b02ad63ee2948894a447d20839f327939
-
SHA512
4bb4c587d867af56e17fc2856dcb3d19fa8b1e406ceba327c81fb72770fc05bdbe9b442ef4e4247a77684e24905200962d1ce906b18a82e928ae9f84dc519e78
-
SSDEEP
1572864:b1lVW950hSk8IpG7V+VPhqFxE7LlhpBB8iYweyJulZUdgP7Xip5ivMazqvCZH1O3:b1bWySkB05awFeLpnNpur7ZvMsRrO3
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-