General
-
Target
NebulaX.exe
-
Size
80.8MB
-
Sample
241114-v761qs1hkn
-
MD5
843c67d37530ff0416ce7a831a84b468
-
SHA1
20a6996f3909723069ea7f11d8831457abec5aa6
-
SHA256
150589300ba121635c9dceaf0659bb9195725e88d4e12a047ba53aec804bbd30
-
SHA512
e0c03cd6a083aec07cb55d7cf6e84180687275c6d7238c0369bf4afbea70fdaff4460e9987de9c97ebeb25af896b351e35b6c0e432d9844d55182158354bf6c9
-
SSDEEP
1572864:MGKlqWsm0hSk8IpG7V+VPhqxJE7xlictiYgj+h58sMwZerzjrFcJ5u:NKU7SkB05awxOwc35ler3Mu
Behavioral task
behavioral1
Sample
NebulaX.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
NebulaX.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
NebulaX.exe
-
Size
80.8MB
-
MD5
843c67d37530ff0416ce7a831a84b468
-
SHA1
20a6996f3909723069ea7f11d8831457abec5aa6
-
SHA256
150589300ba121635c9dceaf0659bb9195725e88d4e12a047ba53aec804bbd30
-
SHA512
e0c03cd6a083aec07cb55d7cf6e84180687275c6d7238c0369bf4afbea70fdaff4460e9987de9c97ebeb25af896b351e35b6c0e432d9844d55182158354bf6c9
-
SSDEEP
1572864:MGKlqWsm0hSk8IpG7V+VPhqxJE7xlictiYgj+h58sMwZerzjrFcJ5u:NKU7SkB05awxOwc35ler3Mu
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1