General
-
Target
noifyy.exe
-
Size
103.1MB
-
Sample
241217-caldnawqes
-
MD5
522023d46f4653ca5f8bde2dcc74d3f9
-
SHA1
80499fdeb25a0bcff815e1bffdd3bcac1bc654f1
-
SHA256
b86dfa689d1acc6652361e3b3f86d61839f859201d625f5c8d6ccbe21538ddd8
-
SHA512
c47e497b68a4803d52767dc35ff6d4d2ef9d5c2ce62be8612edfe735a0b3da0a688d0940c51f5b8f27e87435bb14d6fbc3da41ee85cfffa9fd5aa69f5e11ae5d
-
SSDEEP
3145728:KGJCRrS6xjKcBa6V2qHO5iV2s6VnGQbRe0zJcBl59U:HsZSWNa6THCiFW1XcBl5
Behavioral task
behavioral1
Sample
noifyy.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
noifyy.exe
-
Size
103.1MB
-
MD5
522023d46f4653ca5f8bde2dcc74d3f9
-
SHA1
80499fdeb25a0bcff815e1bffdd3bcac1bc654f1
-
SHA256
b86dfa689d1acc6652361e3b3f86d61839f859201d625f5c8d6ccbe21538ddd8
-
SHA512
c47e497b68a4803d52767dc35ff6d4d2ef9d5c2ce62be8612edfe735a0b3da0a688d0940c51f5b8f27e87435bb14d6fbc3da41ee85cfffa9fd5aa69f5e11ae5d
-
SSDEEP
3145728:KGJCRrS6xjKcBa6V2qHO5iV2s6VnGQbRe0zJcBl59U:HsZSWNa6THCiFW1XcBl5
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-