General
-
Target
malware.exe
-
Size
74.7MB
-
Sample
250102-ryvdssyjam
-
MD5
7d60377131a89d5a04bb4e7d9ea1d34c
-
SHA1
447403e3a5e282549268a1aab274a692f093c8c9
-
SHA256
90a304e19ad39cd162f6350b83b58a72be636b49b358cbbd4d000a4b2b0c11e7
-
SHA512
31471afa22d063b238d1f17c680d5c86e406a8f0f48375ab161e5225a56f8ca41b7d4d7d51fd0b605a906eeea47240b0eb2e7f5c7408ef2b96c397a3af1ac8d8
-
SSDEEP
1572864:rVjlaWaDuSk8IpG7V+VPhqYdflJDgxolhBiYweyJulZUdg2rUWeEaqZ9UW:BAZuSkB05awcflhgxoLGpuSrZ9U
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
malware.exe
-
Size
74.7MB
-
MD5
7d60377131a89d5a04bb4e7d9ea1d34c
-
SHA1
447403e3a5e282549268a1aab274a692f093c8c9
-
SHA256
90a304e19ad39cd162f6350b83b58a72be636b49b358cbbd4d000a4b2b0c11e7
-
SHA512
31471afa22d063b238d1f17c680d5c86e406a8f0f48375ab161e5225a56f8ca41b7d4d7d51fd0b605a906eeea47240b0eb2e7f5c7408ef2b96c397a3af1ac8d8
-
SSDEEP
1572864:rVjlaWaDuSk8IpG7V+VPhqYdflJDgxolhBiYweyJulZUdg2rUWeEaqZ9UW:BAZuSkB05awcflhgxoLGpuSrZ9U
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1