General
-
Target
source_prepared.exe
-
Size
81.2MB
-
Sample
241111-w6eqjawqgp
-
MD5
5c76522574a129d037255370a7ed391d
-
SHA1
fa10c11005b257aaf65ac84365ec0af83c909c82
-
SHA256
5a8f02d70e7587783cce74896dc30fd21f92332cd9e2b1077805891cf8c8a058
-
SHA512
0d8ad8fe1839ab4a27c6a4e62ae87049865306c558b52d5fc04ec194cfe006234b2ffef761cb2dfae19546b5ca43b75176cf1eb87fd06ace6a8b519c607eb87a
-
SSDEEP
1572864:7GKlXebWnCS0hSk8IpG7V+VPhqb+T9E7sliHiYgj+h58sMw5I4eLMF748QZi:iKRCmCPSkB05awb+TZwZ5FleLMZ/
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
81.2MB
-
MD5
5c76522574a129d037255370a7ed391d
-
SHA1
fa10c11005b257aaf65ac84365ec0af83c909c82
-
SHA256
5a8f02d70e7587783cce74896dc30fd21f92332cd9e2b1077805891cf8c8a058
-
SHA512
0d8ad8fe1839ab4a27c6a4e62ae87049865306c558b52d5fc04ec194cfe006234b2ffef761cb2dfae19546b5ca43b75176cf1eb87fd06ace6a8b519c607eb87a
-
SSDEEP
1572864:7GKlXebWnCS0hSk8IpG7V+VPhqb+T9E7sliHiYgj+h58sMw5I4eLMF748QZi:iKRCmCPSkB05awb+TZwZ5FleLMZ/
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1