General
-
Target
doxtool.exe
-
Size
75.7MB
-
Sample
241117-r5yd2asdmq
-
MD5
e661a12400a3bb7cc003004c823c07b3
-
SHA1
48972d49d95345bca7f75b917135c141afbc0f29
-
SHA256
cfda23426d70db7fd1e68990532d0373ca9c9348a2e0e82b33a0f7589b43da34
-
SHA512
ec61c7b9b90e6b476acdd1eeed23f84127b37b83c55b1b63505524939f5b90608ea542c42bb8bda5a96c7918f487c32bf1c7a17f1555fdcef2f432284058cbc3
-
SSDEEP
1572864:F8VlgMWA03Sk8IpG7V+VPhqWK8uE7WxlK8iY4MHHLeqPNLtDSaRZjeq+:FK/SSkB05awWK8mxMXMHVLtxR8q
Behavioral task
behavioral1
Sample
doxtool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
doxtool.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
doxtool.exe
-
Size
75.7MB
-
MD5
e661a12400a3bb7cc003004c823c07b3
-
SHA1
48972d49d95345bca7f75b917135c141afbc0f29
-
SHA256
cfda23426d70db7fd1e68990532d0373ca9c9348a2e0e82b33a0f7589b43da34
-
SHA512
ec61c7b9b90e6b476acdd1eeed23f84127b37b83c55b1b63505524939f5b90608ea542c42bb8bda5a96c7918f487c32bf1c7a17f1555fdcef2f432284058cbc3
-
SSDEEP
1572864:F8VlgMWA03Sk8IpG7V+VPhqWK8uE7WxlK8iY4MHHLeqPNLtDSaRZjeq+:FK/SSkB05awWK8mxMXMHVLtxR8q
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-