General
-
Target
Nexar.exe
-
Size
76.0MB
-
Sample
241113-cwrskavdmh
-
MD5
00699fc912d0f2d4d3a397ffaf2911dd
-
SHA1
3bb6090301df35e7271fdf950bc7446032fb18ac
-
SHA256
c96afebeb6384f5a8df6ea00238d12d724611fdf4f3b7f93fb651784a86346f1
-
SHA512
ff155952a8048a0b4afe972c695f97db3830a24913f41381ef16c2d094dabf629a5b6aec19a4f9569183f563e040845780239f27b51468bed1d3660f38177326
-
SSDEEP
1572864:t8VlCWo03Sk8IpG7V+VPhqIUE7WCylKtFiY4MHHLeqPNLtDan2WVZLw4PV:tKE2SkB05awIACyMoMHVLten/Vi4N
Behavioral task
behavioral1
Sample
Nexar.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nexar.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Nexar.exe
-
Size
76.0MB
-
MD5
00699fc912d0f2d4d3a397ffaf2911dd
-
SHA1
3bb6090301df35e7271fdf950bc7446032fb18ac
-
SHA256
c96afebeb6384f5a8df6ea00238d12d724611fdf4f3b7f93fb651784a86346f1
-
SHA512
ff155952a8048a0b4afe972c695f97db3830a24913f41381ef16c2d094dabf629a5b6aec19a4f9569183f563e040845780239f27b51468bed1d3660f38177326
-
SSDEEP
1572864:t8VlCWo03Sk8IpG7V+VPhqIUE7WCylKtFiY4MHHLeqPNLtDan2WVZLw4PV:tKE2SkB05awIACyMoMHVLten/Vi4N
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-