General
-
Target
defender.exe
-
Size
50.1MB
-
Sample
241203-fccq3szrft
-
MD5
cdfb5e2a9eb82de7147eace7aa822cf5
-
SHA1
64a3f803a9488a1a166cdd257f6fdac13bc6fcc0
-
SHA256
106b4c8e76afb25e9f4dc839a85bccb709713b90320ea103b062b8a644ce627f
-
SHA512
24644afa345d6f3778a5c77e50269d8273455b9e72cddabc9525db2b47cbb4b89b45adff4cde1fd7b82019dd54ac1cf4adfeb8bf94e0bb9158ed7c643fce2c30
-
SSDEEP
1572864:q1lBWBiSk8IpG7V+VPhqFxE76lhpBBU7mViizwvJ:q1r2iSkB05awFJLpnU7+i0u
Behavioral task
behavioral1
Sample
defender.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
defender.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
defender.exe
-
Size
50.1MB
-
MD5
cdfb5e2a9eb82de7147eace7aa822cf5
-
SHA1
64a3f803a9488a1a166cdd257f6fdac13bc6fcc0
-
SHA256
106b4c8e76afb25e9f4dc839a85bccb709713b90320ea103b062b8a644ce627f
-
SHA512
24644afa345d6f3778a5c77e50269d8273455b9e72cddabc9525db2b47cbb4b89b45adff4cde1fd7b82019dd54ac1cf4adfeb8bf94e0bb9158ed7c643fce2c30
-
SSDEEP
1572864:q1lBWBiSk8IpG7V+VPhqFxE76lhpBBU7mViizwvJ:q1r2iSkB05awFJLpnU7+i0u
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-