General
-
Target
source_prepared.exe
-
Size
77.6MB
-
Sample
241219-qnrdqatmgv
-
MD5
6b88c4b0e3f31deff8590388e12e8bd2
-
SHA1
8539df82068b2466b34a5ec8c8f13e0301cc9af1
-
SHA256
3e197ab8e6f5966b8b4420a7c23261e6691fddf9850c0bb47ce7ec2dd51b8409
-
SHA512
1f1587480373b9a2e0f79a9d1707d26681e0358dcca32a80eb4d5536fb5926e96e7abf824f215c5466c6c7faf826b6246a9e47b88478780cb4a5aa5eb72da197
-
SSDEEP
1572864:f1l2WimUSk8IpG7V+VPhqFxE7alh8qAiYweyJulZUdgg4yZgUKd72:f1szmUSkB05awFlLrpus4qYZ2
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
77.6MB
-
MD5
6b88c4b0e3f31deff8590388e12e8bd2
-
SHA1
8539df82068b2466b34a5ec8c8f13e0301cc9af1
-
SHA256
3e197ab8e6f5966b8b4420a7c23261e6691fddf9850c0bb47ce7ec2dd51b8409
-
SHA512
1f1587480373b9a2e0f79a9d1707d26681e0358dcca32a80eb4d5536fb5926e96e7abf824f215c5466c6c7faf826b6246a9e47b88478780cb4a5aa5eb72da197
-
SSDEEP
1572864:f1l2WimUSk8IpG7V+VPhqFxE7alh8qAiYweyJulZUdgg4yZgUKd72:f1szmUSkB05awFlLrpus4qYZ2
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-