General
-
Target
Shibacracked.exe
-
Size
77.6MB
-
Sample
241124-yl7lxswnhy
-
MD5
ada7143b1e447dd71a7b2fabc7682b3d
-
SHA1
9fe9119cc3684206f3df521d31f719ecfafec538
-
SHA256
6fbc5b6909332274d0289b030229c4af5cabf862be589ede8252da243fca4cd2
-
SHA512
d2844d8231379ebb7e501e9a7f306e31df69e74bf93874f817f09101228b8eb21f2f4dc818ec77498f0660374553001dc35a388454747264649b2d8a4d76b0bf
-
SSDEEP
1572864:01laW10hSk8IpG7V+VPhqYdfzE7wlhBiYweyJulZUdg2reIcm8Kg+hL:01ABSkB05awcfzLGpuSrELchL
Behavioral task
behavioral1
Sample
Shibacracked.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Shibacracked.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Shibacracked.exe
-
Size
77.6MB
-
MD5
ada7143b1e447dd71a7b2fabc7682b3d
-
SHA1
9fe9119cc3684206f3df521d31f719ecfafec538
-
SHA256
6fbc5b6909332274d0289b030229c4af5cabf862be589ede8252da243fca4cd2
-
SHA512
d2844d8231379ebb7e501e9a7f306e31df69e74bf93874f817f09101228b8eb21f2f4dc818ec77498f0660374553001dc35a388454747264649b2d8a4d76b0bf
-
SSDEEP
1572864:01laW10hSk8IpG7V+VPhqYdfzE7wlhBiYweyJulZUdg2reIcm8Kg+hL:01ABSkB05awcfzLGpuSrELchL
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-