General
-
Target
spoofer.exe
-
Size
80.7MB
-
Sample
241125-v1bk9axqaz
-
MD5
b915bef7cffd48dfd485d2a85791de47
-
SHA1
1c67c73373e9cefc579db0d469142e1d517f06d6
-
SHA256
ffbf1d7b55600e6c916539794670b7ba8bc4adfc2ecaaf969cda0835138919a1
-
SHA512
a558c32a566e919e4dec4c4e1f654449d2cfbdba2cea9529bfa7549a693fd5a816689db20437daea3efd0e7b3e537eca72c5adb210df592f4f437cf67c867d7d
-
SSDEEP
1572864:QPJlLWLN0RSk8IpG7V+VPhq9AE7DliriYgj+h58sMwierSipjcJ5j:EJNfSkB05aw9Zwl5eerTgj
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spoofer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
spoofer.exe
-
Size
80.7MB
-
MD5
b915bef7cffd48dfd485d2a85791de47
-
SHA1
1c67c73373e9cefc579db0d469142e1d517f06d6
-
SHA256
ffbf1d7b55600e6c916539794670b7ba8bc4adfc2ecaaf969cda0835138919a1
-
SHA512
a558c32a566e919e4dec4c4e1f654449d2cfbdba2cea9529bfa7549a693fd5a816689db20437daea3efd0e7b3e537eca72c5adb210df592f4f437cf67c867d7d
-
SSDEEP
1572864:QPJlLWLN0RSk8IpG7V+VPhq9AE7DliriYgj+h58sMwierSipjcJ5j:EJNfSkB05aw9Zwl5eerTgj
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-