General
-
Target
Atomfirstrealese.exe
-
Size
81.5MB
-
Sample
241130-v5lxsatqal
-
MD5
ebb281876ded2a7d47e814833b7da40d
-
SHA1
9dee35bf280862715436a3605ad3325a95453709
-
SHA256
c9d35f2c10d12b42104b4d3b04d31462c40cecf4f536424390d56a996c726d5e
-
SHA512
42ddfae7d2cd9fecdb839d039ffa6c5424040cce3e922aa38139dbcac69bcd885942c80f50f456ae56ba1d97891a166071bdc286121f6ebd48211de67bce0e7f
-
SSDEEP
1572864:PGKlqWLT0hSk8IpG7V+VPhqclE7plifiYgj+h58sMwlerSipjcJ5j:OKMzSkB05awcIwB5BerTgj
Behavioral task
behavioral1
Sample
Atomfirstrealese.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Atomfirstrealese.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Atomfirstrealese.exe
-
Size
81.5MB
-
MD5
ebb281876ded2a7d47e814833b7da40d
-
SHA1
9dee35bf280862715436a3605ad3325a95453709
-
SHA256
c9d35f2c10d12b42104b4d3b04d31462c40cecf4f536424390d56a996c726d5e
-
SHA512
42ddfae7d2cd9fecdb839d039ffa6c5424040cce3e922aa38139dbcac69bcd885942c80f50f456ae56ba1d97891a166071bdc286121f6ebd48211de67bce0e7f
-
SSDEEP
1572864:PGKlqWLT0hSk8IpG7V+VPhqclE7plifiYgj+h58sMwlerSipjcJ5j:OKMzSkB05awcIwB5BerTgj
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-