General
-
Target
Lexor.exe
-
Size
76.8MB
-
Sample
241111-vlbmps1lft
-
MD5
3c7d5a1ed6a37845eb0516c1bc90a638
-
SHA1
2ed4309a62b6cef2217b2c2ebc741aa0ecdc941c
-
SHA256
dc0ef149a815688e93d6eddcdc659ef6616dece29a1e73000d41d63e6e5adb31
-
SHA512
2ec57349c406169b58fd930ccee57023e854218f475fe0434227f5e09614dda5980ac6dbeb5bdec19b35ce9147006b44b4263f0a6a2149434305020262cfaf40
-
SSDEEP
1572864:7j1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7nivMazqvCZH1O3:7j1AOoSkB05awO6L+nupuu7ivMsRrO3
Behavioral task
behavioral1
Sample
Lexor.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Lexor.exe
-
Size
76.8MB
-
MD5
3c7d5a1ed6a37845eb0516c1bc90a638
-
SHA1
2ed4309a62b6cef2217b2c2ebc741aa0ecdc941c
-
SHA256
dc0ef149a815688e93d6eddcdc659ef6616dece29a1e73000d41d63e6e5adb31
-
SHA512
2ec57349c406169b58fd930ccee57023e854218f475fe0434227f5e09614dda5980ac6dbeb5bdec19b35ce9147006b44b4263f0a6a2149434305020262cfaf40
-
SSDEEP
1572864:7j1laWdP0hSk8IpG7V+VPhqOlE7Llh+BBZiYweyJulZUdgC7nivMazqvCZH1O3:7j1AOoSkB05awO6L+nupuu7ivMsRrO3
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-