General
-
Target
BoostX.exe
-
Size
36.2MB
-
Sample
250102-bbxyeavjby
-
MD5
eb564d54266a2fe8c3d53f5500fb241d
-
SHA1
4f409ae3fbad0f569ce332c0baac7ba690003ab8
-
SHA256
de45b86d0366d623372e6bc76600ec2c4b869d744ccad6f12844d1d1383b7b96
-
SHA512
c8c675729a1f746660dae0433b5cc3ea62a8e849e81925ec898993be18140d3650056d776ea48378d611e97aae62db452a974e355931a6e6ea9a8dee69841dbb
-
SSDEEP
786432:7iIZYlOW8J/LXm1NqdbTOuzcY8763lXRXTa8vK1yn2CidJmU4/DI+:G1lOWqDXmqdfzE7ylhurc2HGE
Behavioral task
behavioral1
Sample
BoostX.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Targets
-
-
Target
BoostX.exe
-
Size
36.2MB
-
MD5
eb564d54266a2fe8c3d53f5500fb241d
-
SHA1
4f409ae3fbad0f569ce332c0baac7ba690003ab8
-
SHA256
de45b86d0366d623372e6bc76600ec2c4b869d744ccad6f12844d1d1383b7b96
-
SHA512
c8c675729a1f746660dae0433b5cc3ea62a8e849e81925ec898993be18140d3650056d776ea48378d611e97aae62db452a974e355931a6e6ea9a8dee69841dbb
-
SSDEEP
786432:7iIZYlOW8J/LXm1NqdbTOuzcY8763lXRXTa8vK1yn2CidJmU4/DI+:G1lOWqDXmqdfzE7ylhurc2HGE
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-