General
-
Target
source_prepared.exe
-
Size
107.4MB
-
Sample
241128-t34jdasrht
-
MD5
80e5d9c1221d6b5ce966a9d0222f23f6
-
SHA1
566711ce9b8ca26bf7cdd3ce6388acd6d49eef1b
-
SHA256
110507cf41b6395daff3643e012339044d04a5c6989f01080ecd521403795aaf
-
SHA512
e3ab1681c9a2f49d315686cb774a9a09dc7dd78f1348b4f8c9fe3f6809013ebc925201b5d8b7caa402e95c2515577dbd4eda4d99b3a9a0ad518e41440aa1663c
-
SSDEEP
3145728:bU5eCRRS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQQyUOL:A5JjSWNa6NHCibhieB/
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
107.4MB
-
MD5
80e5d9c1221d6b5ce966a9d0222f23f6
-
SHA1
566711ce9b8ca26bf7cdd3ce6388acd6d49eef1b
-
SHA256
110507cf41b6395daff3643e012339044d04a5c6989f01080ecd521403795aaf
-
SHA512
e3ab1681c9a2f49d315686cb774a9a09dc7dd78f1348b4f8c9fe3f6809013ebc925201b5d8b7caa402e95c2515577dbd4eda4d99b3a9a0ad518e41440aa1663c
-
SSDEEP
3145728:bU5eCRRS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQQyUOL:A5JjSWNa6NHCibhieB/
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1