General
-
Target
jews.exe
-
Size
76.8MB
-
Sample
241211-dtlzzatpbx
-
MD5
300e21fecc8fb2caf8cbdfca73a88efe
-
SHA1
edd52977000151debf4d7fc0e23fffa9b314d9e0
-
SHA256
7cd7eaa612e73ff5601437663af2f960776a1a60be7d7236d938f28b127f90b3
-
SHA512
9756f0590cf0f85d00afa68f9915401380ab092f9b5009efe18801919915f9cd2d49786832826a54355c1841945d163acb4ab669e085e22d98f1aaadb368473d
-
SSDEEP
1572864:i1loWMHmUSk8IpG7V+VPhqQdSTE7xFlhqXiYweyJulZUdg33XiRybL/Z9Ui:i1O7mUSkB05awkSyLPpuT3vh9U
Behavioral task
behavioral1
Sample
jews.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
jews.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
jews.exe
-
Size
76.8MB
-
MD5
300e21fecc8fb2caf8cbdfca73a88efe
-
SHA1
edd52977000151debf4d7fc0e23fffa9b314d9e0
-
SHA256
7cd7eaa612e73ff5601437663af2f960776a1a60be7d7236d938f28b127f90b3
-
SHA512
9756f0590cf0f85d00afa68f9915401380ab092f9b5009efe18801919915f9cd2d49786832826a54355c1841945d163acb4ab669e085e22d98f1aaadb368473d
-
SSDEEP
1572864:i1loWMHmUSk8IpG7V+VPhqQdSTE7xFlhqXiYweyJulZUdg33XiRybL/Z9Ui:i1O7mUSkB05awkSyLPpuT3vh9U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-