General
-
Target
cryptedfile.exe
-
Size
176.9MB
-
Sample
241226-t422ya1jaz
-
MD5
935990d024bc38a952cfa7280b576a91
-
SHA1
10e6fde848a891fbcf4b44d101cc7216a2416fa7
-
SHA256
ae251adaa1040eea16a46ce740d998ee6394cbeff0aac3b916c93859c5e0309b
-
SHA512
e95d972e381ff517a9b5afe541420f8a1bd824b86987fff04a92f29bd37d3bd942ec41c67aee596988007ad24bdae9fec6509d2dc30927e94a0454df039e147f
-
SSDEEP
3145728:TKWI2omcSkB05awK2ixmMvMHVLtdw/3ZN:LI2omKi8DrM3yT
Behavioral task
behavioral1
Sample
cryptedfile.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cryptedfile.exe
-
Size
176.9MB
-
MD5
935990d024bc38a952cfa7280b576a91
-
SHA1
10e6fde848a891fbcf4b44d101cc7216a2416fa7
-
SHA256
ae251adaa1040eea16a46ce740d998ee6394cbeff0aac3b916c93859c5e0309b
-
SHA512
e95d972e381ff517a9b5afe541420f8a1bd824b86987fff04a92f29bd37d3bd942ec41c67aee596988007ad24bdae9fec6509d2dc30927e94a0454df039e147f
-
SSDEEP
3145728:TKWI2omcSkB05awK2ixmMvMHVLtdw/3ZN:LI2omKi8DrM3yT
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-