General
-
Target
source_prepared.exe
-
Size
103.9MB
-
Sample
241207-da5yqssjb1
-
MD5
98ecf03bd7eeda49dc5472572038ad33
-
SHA1
9be2fd5cc29e1d82702ca5ca8b1031c3944e91b3
-
SHA256
9be34f5114c5b77d57da8403133aa13ed627256967de4c9c9ae5caffb422d63f
-
SHA512
2a36e0c9b4d83958c6e762e04fd0d9f12f017ce99f692638b473d3f34eab63c99aafcf41864e8016800f9273b2dbc0231da525199d46eb9e2a47b787766f9b56
-
SSDEEP
3145728:yAyCRrS6xjKcBanL2qHO5iV0fnGQbRe0zJcBxJZ2:RtZSWNaBHCiu1XcBg
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
103.9MB
-
MD5
98ecf03bd7eeda49dc5472572038ad33
-
SHA1
9be2fd5cc29e1d82702ca5ca8b1031c3944e91b3
-
SHA256
9be34f5114c5b77d57da8403133aa13ed627256967de4c9c9ae5caffb422d63f
-
SHA512
2a36e0c9b4d83958c6e762e04fd0d9f12f017ce99f692638b473d3f34eab63c99aafcf41864e8016800f9273b2dbc0231da525199d46eb9e2a47b787766f9b56
-
SSDEEP
3145728:yAyCRrS6xjKcBanL2qHO5iV0fnGQbRe0zJcBxJZ2:RtZSWNaBHCiu1XcBg
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-