General
-
Target
Defender.exe
-
Size
101.7MB
-
Sample
241124-ttnrkaxph1
-
MD5
4639f7017af991701fff3d146503e89a
-
SHA1
fa01f0919cfcc14ce13f10ef788525117f7972da
-
SHA256
9aba31cd70bb74c0a15d8776f6f513680447a6982eb9f0a56bb0d1e12bba8428
-
SHA512
62d77a2396abe0b8de36537d13524f1d098e6bde1cbc574900a1c2c470e9ab902d63d332669586d9b4f2a4fefe9e7da4f9a53b5644a79eb28db53e90c35f9408
-
SSDEEP
3145728:U4i5r79S6xjKcBaNJ2qHO5i29enGUDd+mA28NFnmSkkr8:Ap5SWNaNPHCi2uzA28NxF
Behavioral task
behavioral1
Sample
Defender.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Defender.exe
-
Size
101.7MB
-
MD5
4639f7017af991701fff3d146503e89a
-
SHA1
fa01f0919cfcc14ce13f10ef788525117f7972da
-
SHA256
9aba31cd70bb74c0a15d8776f6f513680447a6982eb9f0a56bb0d1e12bba8428
-
SHA512
62d77a2396abe0b8de36537d13524f1d098e6bde1cbc574900a1c2c470e9ab902d63d332669586d9b4f2a4fefe9e7da4f9a53b5644a79eb28db53e90c35f9408
-
SSDEEP
3145728:U4i5r79S6xjKcBaNJ2qHO5i29enGUDd+mA28NFnmSkkr8:Ap5SWNaNPHCi2uzA28NxF
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-