General
-
Target
zheat.exe
-
Size
51.2MB
-
Sample
241208-a2zn9asqes
-
MD5
e4505484b111ded0583f1a9161b72e8d
-
SHA1
317564ae746fb787cf7ee13401071885c4a5274d
-
SHA256
48aa8867a97e436672d4ee12a3305ade4249d6e7362fe81aaced5ee62fe7d3e4
-
SHA512
790c2a19e27b17c7c96f412523898eb3064c927d33f210a615f78ed4742f44a62f74e07dc9c7016b783799ed52fe4746347df762c99bc2a5d892a89b70e0feb3
-
SSDEEP
1572864:ZGGOcWjMmmSk8IpG7V+VPhqO+TE7cIjerHSxCAPAsK:wGJEMmmSkB05awO+JOer89P1K
Behavioral task
behavioral1
Sample
zheat.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
zheat.exe
-
Size
51.2MB
-
MD5
e4505484b111ded0583f1a9161b72e8d
-
SHA1
317564ae746fb787cf7ee13401071885c4a5274d
-
SHA256
48aa8867a97e436672d4ee12a3305ade4249d6e7362fe81aaced5ee62fe7d3e4
-
SHA512
790c2a19e27b17c7c96f412523898eb3064c927d33f210a615f78ed4742f44a62f74e07dc9c7016b783799ed52fe4746347df762c99bc2a5d892a89b70e0feb3
-
SSDEEP
1572864:ZGGOcWjMmmSk8IpG7V+VPhqO+TE7cIjerHSxCAPAsK:wGJEMmmSkB05awO+JOer89P1K
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-