General
-
Target
VexWare (5).exe
-
Size
87.6MB
-
Sample
250201-tk9bxazkay
-
MD5
318b6716eb2f476d49dc2b5696e72095
-
SHA1
12f88564f2001f7ac1ffe0a33c024beaea8e4d51
-
SHA256
1e460d6497fb44ad2dd621290380c96858382b8a773e6871c4ffc0ef5a95a196
-
SHA512
d009ca79c889dde0a58c06014f5f646aae74deebd5ec358ebdcebce712096afefc677db20b2b5689846628ae903d2723d8a01dd43e66771b4faefb8790de99d5
-
SSDEEP
1572864:A2GKlXebWqsm/OkiqOv8im2A3+T9E7CliHiYgj+h58sMw5I6e389PcJFJZ:AnKRCtsm/OknOv8i36+TXwZ5FHe38gJ
Behavioral task
behavioral1
Sample
VexWare (5).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VexWare (5).exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
VexWare (5).exe
-
Size
87.6MB
-
MD5
318b6716eb2f476d49dc2b5696e72095
-
SHA1
12f88564f2001f7ac1ffe0a33c024beaea8e4d51
-
SHA256
1e460d6497fb44ad2dd621290380c96858382b8a773e6871c4ffc0ef5a95a196
-
SHA512
d009ca79c889dde0a58c06014f5f646aae74deebd5ec358ebdcebce712096afefc677db20b2b5689846628ae903d2723d8a01dd43e66771b4faefb8790de99d5
-
SSDEEP
1572864:A2GKlXebWqsm/OkiqOv8im2A3+T9E7CliHiYgj+h58sMw5I6e389PcJFJZ:AnKRCtsm/OknOv8i36+TXwZ5FHe38gJ
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-