General
-
Target
source_prepared.exe.zip
-
Size
75.4MB
-
Sample
241209-vlrzpazkgl
-
MD5
fffaa8e1720e557d41227f11c44bfb3e
-
SHA1
e0a892b6fa090dc7bbd6b98bc47302bb8a57d24d
-
SHA256
9328ca674d654ebf6f088456309a666e390d592ebb957483759e70055078392a
-
SHA512
dff84decfe6af8cdeb1320c9ca7402b3c063d4c7293c5eac3ca07808ef6c837b41b70e07e886564c49da597900a76cf9616e7316a0a3cbd3578447424d76be24
-
SSDEEP
1572864:o9FlhW622ucy4Zyh/et9riPuodoCbIzZsOC1HZwUVp/BdEbUZb+GYA:oP6622ucdEt42PECMz/C13/BObUYa
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
75.8MB
-
MD5
d27e151891d42caa195199b77e843d88
-
SHA1
c76fe47384a52c88a9fa044b4a194f86a5dfefba
-
SHA256
b6bf856f34b8bb5db46680c7cfed3ca4a8fbd0b170c9640a17242ca3f2833563
-
SHA512
b8909a66514a06aafcc14c8814265bd6d321297a99bd2d361b8ef932fe58be653b4e123e73d3dcf658c35f78d5ba65f14c9bca696fcbcdb563027641ca297f50
-
SSDEEP
1572864:O8Vl1xWyomcSk8IpG7V+VPhqIUE7WSlKiRiY4MHHLeqPNLtDJ67Z7YG4:OKdjomcSkB05awIASMiOMHVLtN67O
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-