General
-
Target
cheat.exe
-
Size
81.1MB
-
Sample
241208-zgfhbayncj
-
MD5
783fa5df487f0031b2202d38cbee6357
-
SHA1
294cb588b520ef073ae92dd24c7602c2568e3870
-
SHA256
0ba47470933107eb96d79fbfaf0bb5f8e59f8d330d38c54b65bb44a5b28415d8
-
SHA512
c29a90faa269751676e9b8f3b768db34bbc303aadb9420e51a83567f75ee8647614656910910e1a44ad260971510b06d99a096bed41d9e5ef7ecf80fc2ae9adc
-
SSDEEP
1572864:CGKlXOUWtMmpSk8IpG7V+VPhqO+ynE7qliJiYgj+h58sMwIIXerWhH/cJFJ:LKRdWMmpSkB05awO+y5wL5kmer4eJ
Behavioral task
behavioral1
Sample
cheat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cheat.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cheat.exe
-
Size
81.1MB
-
MD5
783fa5df487f0031b2202d38cbee6357
-
SHA1
294cb588b520ef073ae92dd24c7602c2568e3870
-
SHA256
0ba47470933107eb96d79fbfaf0bb5f8e59f8d330d38c54b65bb44a5b28415d8
-
SHA512
c29a90faa269751676e9b8f3b768db34bbc303aadb9420e51a83567f75ee8647614656910910e1a44ad260971510b06d99a096bed41d9e5ef7ecf80fc2ae9adc
-
SSDEEP
1572864:CGKlXOUWtMmpSk8IpG7V+VPhqO+ynE7qliJiYgj+h58sMwIIXerWhH/cJFJ:LKRdWMmpSkB05awO+y5wL5kmer4eJ
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-