General
-
Target
TriggerFinder.exe
-
Size
76.6MB
-
Sample
250101-d44mrstjhv
-
MD5
e63a8cb540b649742e86f6ac1655d487
-
SHA1
552f95291c8031def5e100e21f61fd3a85bab397
-
SHA256
d960b2484911a1013062e2f636243942a77a0ec8c83aecfdc4d275f6aacfd40a
-
SHA512
7783ae9037c6db31f1d8f20ad1338e006f02b2dd85a3b59d061483639e99023b7bb72927e5c914adeef5b9eb07782f736a0702896c29d4fbc3622ec2b5c13763
-
SSDEEP
1572864:p1l7WdXmUSk8IpG7V+VPhqFxE7glSWiYweyJulZUdg6zfziu3d72:p1Z0XmUSkB05awF18LpuqbPZ2
Behavioral task
behavioral1
Sample
TriggerFinder.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
TriggerFinder.exe
-
Size
76.6MB
-
MD5
e63a8cb540b649742e86f6ac1655d487
-
SHA1
552f95291c8031def5e100e21f61fd3a85bab397
-
SHA256
d960b2484911a1013062e2f636243942a77a0ec8c83aecfdc4d275f6aacfd40a
-
SHA512
7783ae9037c6db31f1d8f20ad1338e006f02b2dd85a3b59d061483639e99023b7bb72927e5c914adeef5b9eb07782f736a0702896c29d4fbc3622ec2b5c13763
-
SSDEEP
1572864:p1l7WdXmUSk8IpG7V+VPhqFxE7glSWiYweyJulZUdg6zfziu3d72:p1Z0XmUSkB05awF18LpuqbPZ2
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-