General
-
Target
source_prepared.exe
-
Size
80.7MB
-
Sample
241231-2txy8stlgt
-
MD5
95acc15a77e8f074cbef28c0025b2ed0
-
SHA1
9100acce8244df5a60726aa0e89229a292cc7794
-
SHA256
0d44474158bd25fe983d3892ed0394763c5a63723783fa629a7196412bd06cd7
-
SHA512
d83544337bd5ee26ff853804310c3ad6111e2575297fe03480c2851a01377ec410f432c6759c8ae467e209323c5848dd6998bc678d823d930c7c15ee6c345aab
-
SSDEEP
1572864:CGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw/DBZB:LK51smwSkB05awFVwE65Dt
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.7MB
-
MD5
95acc15a77e8f074cbef28c0025b2ed0
-
SHA1
9100acce8244df5a60726aa0e89229a292cc7794
-
SHA256
0d44474158bd25fe983d3892ed0394763c5a63723783fa629a7196412bd06cd7
-
SHA512
d83544337bd5ee26ff853804310c3ad6111e2575297fe03480c2851a01377ec410f432c6759c8ae467e209323c5848dd6998bc678d823d930c7c15ee6c345aab
-
SSDEEP
1572864:CGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw/DBZB:LK51smwSkB05awFVwE65Dt
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Virtualization/Sandbox Evasion
1