General
-
Target
Maxer.exe
-
Size
76.8MB
-
Sample
241111-t9wr4s1hnj
-
MD5
f56d0c354de3277f65f62a5ab202456c
-
SHA1
72019d84a33df8931562eeb654e289db36275224
-
SHA256
08d96711028852c7df474034dd13542ab905597ea5f499ede2841a89dc0e9966
-
SHA512
9beb70ffdf0174054b58361a74981b620a78ede0d87ebd8ef8630f3822ad193e7ab6e2f21fce7dd264b041ac2da29ce76a335834f9a205c53b744618d467e4ba
-
SSDEEP
1572864:Rb1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7n+vMTzqvCZH1O3:d1AOoSkB05awO6L+nupuu7+vMXRrO3
Behavioral task
behavioral1
Sample
Maxer.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Maxer.exe
-
Size
76.8MB
-
MD5
f56d0c354de3277f65f62a5ab202456c
-
SHA1
72019d84a33df8931562eeb654e289db36275224
-
SHA256
08d96711028852c7df474034dd13542ab905597ea5f499ede2841a89dc0e9966
-
SHA512
9beb70ffdf0174054b58361a74981b620a78ede0d87ebd8ef8630f3822ad193e7ab6e2f21fce7dd264b041ac2da29ce76a335834f9a205c53b744618d467e4ba
-
SSDEEP
1572864:Rb1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7n+vMTzqvCZH1O3:d1AOoSkB05awO6L+nupuu7+vMXRrO3
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-