General
-
Target
Dupeinjecter.exe
-
Size
81.4MB
-
Sample
241111-tgeywszndz
-
MD5
2ae43b357cda81e0c5e6d3b3b3c8d6c7
-
SHA1
0f202791a3e91cfb857f458f851a4d192a27cfc2
-
SHA256
ef9d0f0f6064b51d6cbf7578528cd525165cae6b95e76ebdd8f927f792cbfb13
-
SHA512
b9176f50c8669fb7f399a945dfbb793b1a14a1f60b8bc3564258d07f542f61946714105330e24582c6f26c0a24cc3aefbc96170f4ed7958f5f6fce5fbfb7bb34
-
SSDEEP
1572864:wGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:JKibZSkB05awHAw025c7
Behavioral task
behavioral1
Sample
Dupeinjecter.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Dupeinjecter.exe
-
Size
81.4MB
-
MD5
2ae43b357cda81e0c5e6d3b3b3c8d6c7
-
SHA1
0f202791a3e91cfb857f458f851a4d192a27cfc2
-
SHA256
ef9d0f0f6064b51d6cbf7578528cd525165cae6b95e76ebdd8f927f792cbfb13
-
SHA512
b9176f50c8669fb7f399a945dfbb793b1a14a1f60b8bc3564258d07f542f61946714105330e24582c6f26c0a24cc3aefbc96170f4ed7958f5f6fce5fbfb7bb34
-
SSDEEP
1572864:wGKlgWjcw0hSk8IpG7V+VPhqHJE7bbli08iYgj+h58sMw4DPZcj:JKibZSkB05awHAw025c7
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-