Resubmissions
25-01-2025 18:18
250125-wxwbxswqep 10General
-
Target
-
Size
76.7MB
-
Sample
250125-wxwbxswqep
-
MD5
e27f01ee74f3c9d90b8e8892d6ae1e50
-
SHA1
008613e281fe4572d50137947939e18335e1f697
-
SHA256
cb1197647ae39825d65ade7a0f6a8d11614591e1872dede274d295ee0bc58ff2
-
SHA512
dbb3ea2fbaf39ce63f336530363e33292854a10a6afbe67c0a6f0956014a998a661bd88572b015fa1a985dc5ab1d78014bb07d3929da71ec822d84b0acb8effd
-
SSDEEP
1572864:o1lVWd50ASk8IpG7V+VPhqFxE7LlhrBB8iY3peyJulZUdgP7mGvMTz0v2ZH1O3:o1bOrSkB05awFeLrnCpur7jvMX5rO3
Malware Config
Targets
-
-
Target
-
Size
76.7MB
-
MD5
e27f01ee74f3c9d90b8e8892d6ae1e50
-
SHA1
008613e281fe4572d50137947939e18335e1f697
-
SHA256
cb1197647ae39825d65ade7a0f6a8d11614591e1872dede274d295ee0bc58ff2
-
SHA512
dbb3ea2fbaf39ce63f336530363e33292854a10a6afbe67c0a6f0956014a998a661bd88572b015fa1a985dc5ab1d78014bb07d3929da71ec822d84b0acb8effd
-
SSDEEP
1572864:o1lVWd50ASk8IpG7V+VPhqFxE7LlhrBB8iY3peyJulZUdgP7mGvMTz0v2ZH1O3:o1bOrSkB05awFeLrnCpur7jvMX5rO3
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1