General
-
Target
idk.exe
-
Size
107.6MB
-
Sample
250108-q81swssmbx
-
MD5
e9fb64dd2e7a0ff9f9a16040eace1a99
-
SHA1
767788816f7bff0c757e98607851215f31084454
-
SHA256
7569509db7533d44ae999b8b50e4e918906c71edc3d57b6cba2b6696880240fa
-
SHA512
d9b466767798af962ff1e7e453601eef8671ab5b851b49e18ddd4aff8f8e6da3d3fcaab5a3e4886e76e9adb8de890b3d0d460f62168a25b5065d0394dba88b0e
-
SSDEEP
3145728:0cN7eCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxQwu4RM:rN7JjSWNa6NHCiWhieBB
Behavioral task
behavioral1
Sample
idk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
idk.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
idk.exe
-
Size
107.6MB
-
MD5
e9fb64dd2e7a0ff9f9a16040eace1a99
-
SHA1
767788816f7bff0c757e98607851215f31084454
-
SHA256
7569509db7533d44ae999b8b50e4e918906c71edc3d57b6cba2b6696880240fa
-
SHA512
d9b466767798af962ff1e7e453601eef8671ab5b851b49e18ddd4aff8f8e6da3d3fcaab5a3e4886e76e9adb8de890b3d0d460f62168a25b5065d0394dba88b0e
-
SSDEEP
3145728:0cN7eCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxQwu4RM:rN7JjSWNa6NHCiWhieBB
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-