General
-
Target
Hx Bypass.exe
-
Size
83.1MB
-
Sample
250124-kvsbpszqc1
-
MD5
e863d1f40f37388f27cde6200b1a06a9
-
SHA1
d7c8a6574b4d6a5a96626dfc86f591326bd50279
-
SHA256
19c7a330a81bef7cb9108a5b8563911a46fd691c4106ba0a5539bead0a44e957
-
SHA512
fa6239603d72704467b5c51c72ec1f19209c78f374564a33ce01783e1f333cb62b7b4fd0a92110ced4b09a7c2be20468b1ed6b561097405c1a0c4171e8ddfea2
-
SSDEEP
1572864:7VjlQWdFm7OkiqOv8im2AqlE7glhCiYweyJulZUdgMzZDd72:R20Fm7OknOv8i3d5LfpuoRZ2
Behavioral task
behavioral1
Sample
Hx Bypass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Hx Bypass.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
Hx Bypass.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Hx Bypass.exe
-
Size
83.1MB
-
MD5
e863d1f40f37388f27cde6200b1a06a9
-
SHA1
d7c8a6574b4d6a5a96626dfc86f591326bd50279
-
SHA256
19c7a330a81bef7cb9108a5b8563911a46fd691c4106ba0a5539bead0a44e957
-
SHA512
fa6239603d72704467b5c51c72ec1f19209c78f374564a33ce01783e1f333cb62b7b4fd0a92110ced4b09a7c2be20468b1ed6b561097405c1a0c4171e8ddfea2
-
SSDEEP
1572864:7VjlQWdFm7OkiqOv8im2AqlE7glhCiYweyJulZUdgMzZDd72:R20Fm7OknOv8i3d5LfpuoRZ2
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1