General
-
Target
spiffy.ware (1).rar
-
Size
85.7MB
-
Sample
250201-q5zfnawrgn
-
MD5
1cec77947f8aec801f8728042d02609d
-
SHA1
54c6353b2d74381c4e8f727e50fcc98d0e2649f7
-
SHA256
e411727fdec4211740bc4f292766a8ae189bbcb98fe696ecffd5b6e1d19c3e0c
-
SHA512
1c4df3ceb83174c09476ab93ef357d7a7cf101a65e9d3b049f5efbca96c479f076686adaa13f8676606efaf69abbec9c178528c827b11d2a27590cd38ce1bc41
-
SSDEEP
1572864:sn1i7FqiNge1PcS4qZ7TV8aZ5eqyRs9kEQ0jC9hYsM3Q7ZTUHi2FZ+I:G1i7FqiNXPZn8A5eqyRs9a0jC9uA7ZTG
Behavioral task
behavioral1
Sample
spiffy.ware (1).rar
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
spiffy.ware (1).rar
-
Size
85.7MB
-
MD5
1cec77947f8aec801f8728042d02609d
-
SHA1
54c6353b2d74381c4e8f727e50fcc98d0e2649f7
-
SHA256
e411727fdec4211740bc4f292766a8ae189bbcb98fe696ecffd5b6e1d19c3e0c
-
SHA512
1c4df3ceb83174c09476ab93ef357d7a7cf101a65e9d3b049f5efbca96c479f076686adaa13f8676606efaf69abbec9c178528c827b11d2a27590cd38ce1bc41
-
SSDEEP
1572864:sn1i7FqiNge1PcS4qZ7TV8aZ5eqyRs9kEQ0jC9hYsM3Q7ZTUHi2FZ+I:G1i7FqiNXPZn8A5eqyRs9a0jC9uA7ZTG
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1