General
-
Target
first.exe
-
Size
84.9MB
-
Sample
250203-atj9latkgs
-
MD5
9c453a9712b9219abc49c8aaa6c5a6d5
-
SHA1
6f84482f802b0ee48e59fe44da855b7e7ce7546e
-
SHA256
71fee025e3825e8edd5b36132d504c8bd4ac384625c943e29119a8c09bbfac7a
-
SHA512
df146bc2cd2e105fc9ab87c265403308abd84817f6c8b2261d40b84a78e42c38ba6f804588c932bd58a91b892ffb2d32844559947124b8bf4f53a36cf8247713
-
SSDEEP
1572864:CTPGULSiukfhLhyPlzwnGKlbWjdsm/OkiqOv8im2AzJE74blicRVPw/:CTjLSiuIhLhy9cGKRcsm/OknOv8i3mHu
Behavioral task
behavioral1
Sample
first.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
first.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
first.exe
-
Size
84.9MB
-
MD5
9c453a9712b9219abc49c8aaa6c5a6d5
-
SHA1
6f84482f802b0ee48e59fe44da855b7e7ce7546e
-
SHA256
71fee025e3825e8edd5b36132d504c8bd4ac384625c943e29119a8c09bbfac7a
-
SHA512
df146bc2cd2e105fc9ab87c265403308abd84817f6c8b2261d40b84a78e42c38ba6f804588c932bd58a91b892ffb2d32844559947124b8bf4f53a36cf8247713
-
SSDEEP
1572864:CTPGULSiukfhLhyPlzwnGKlbWjdsm/OkiqOv8im2AzJE74blicRVPw/:CTjLSiuIhLhy9cGKRcsm/OknOv8i3mHu
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-