General
-
Target
source_prepared.exe
-
Size
75.9MB
-
Sample
241205-13t39s1kdj
-
MD5
7bf1004db0e9aebc6d7a87f5623b873d
-
SHA1
e9ac1e9cef961b259d5dd1ccaf3d10757a3fda48
-
SHA256
83a77312cd2d5807538c6bc6055bd9533040d6ca8ed21aa4ff40e276c453f9d6
-
SHA512
abcc47540c1da0febfae5c02e24e9c912e76e1eb3be33c232d8b4798e1ef377ff19ac8907291d13cd548aff14c1d35fdb60ec0f9603003e81b9ea0b0698da92f
-
SSDEEP
1572864:B3mlIWgwm9Sk8IpG7V+VPhqSUE7WxzlK9piY4MHHLeqPNLtDNHz/3Zzeej:B2OPwm9SkB05awSAxzMAMHVLtZHL3Qej
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
75.9MB
-
MD5
7bf1004db0e9aebc6d7a87f5623b873d
-
SHA1
e9ac1e9cef961b259d5dd1ccaf3d10757a3fda48
-
SHA256
83a77312cd2d5807538c6bc6055bd9533040d6ca8ed21aa4ff40e276c453f9d6
-
SHA512
abcc47540c1da0febfae5c02e24e9c912e76e1eb3be33c232d8b4798e1ef377ff19ac8907291d13cd548aff14c1d35fdb60ec0f9603003e81b9ea0b0698da92f
-
SSDEEP
1572864:B3mlIWgwm9Sk8IpG7V+VPhqSUE7WxzlK9piY4MHHLeqPNLtDNHz/3Zzeej:B2OPwm9SkB05awSAxzMAMHVLtZHL3Qej
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1