General
-
Target
241231-2f92msspfx_pw_infected.zip
-
Size
80.3MB
-
Sample
241231-2kbpmssqhs
-
MD5
8088db3f275f0b7ef166068b5e249623
-
SHA1
735eb7e8d746d29e605beeff18d584a4e805e780
-
SHA256
58e29228e7bea1af23438bedb191679b3ce6f892c48e3930920863c5c6a1c7d1
-
SHA512
027acce6946e9e0817fa35c27ecb9b7c40fc7a6599fe076f439caa0252b5864e0dc44fa4732faae06b039eaa850fd925f8125040acbb373c5c83d8f54a67c69f
-
SSDEEP
1572864:vY00hT+4sxW1GJhAyoDKCTWaSJwG0B2KBsFWOIZRD7n+UiBH9uX10bTLFo:AIpWlT+aSKZ8KBsxIZMBPbTLFo
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.7MB
-
MD5
9602740c00f3a0fd2f4112e07a823698
-
SHA1
2f3777c223cdf15738f6ccf6b2f8004f7f32191b
-
SHA256
88af6be6296add5e995b44d3226ba7ef53514101caa913301f4ba8f0380ce536
-
SHA512
511c9329722ac7aa0ef018be0745ff5e983cfffaada423e879923d0481d9b9d46b7100e82b395b98411e8a61d4942dd0cb8ba1b6cf05feb6ae4c4063b8ca4037
-
SSDEEP
1572864:dGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw/DBZB:cK51smwSkB05awFVwE65Dt
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-