General
-
Target
s.zip
-
Size
39.6MB
-
Sample
250205-l7xbvs1rex
-
MD5
9796d81cb5fb953823fe2e044a06cbae
-
SHA1
4ad0ada6265c729be745213451e2844320242d77
-
SHA256
2c660e1b097d166973b2336db271132b984e20432acdcc7bc203eb7f5057ec5c
-
SHA512
dca93379c066b999891f80ac6b4c721c7da1c19a1d00a5733a091fbd98b4c32a71194a0b08cc8773b66b43bf24dfcb666597e90d40fbfb4c83168b98b79fc9b9
-
SSDEEP
786432:CLQMH0mNG3yCo+45kFJ7RCkMhZn5CpxF54G8JqI166bQ4XiEKUAhPt22GcFw5maS:CUxuqVRCkMhZnspp4JfZkhhhgnk2w
Behavioral task
behavioral1
Sample
s.zip
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
s.zip
-
Size
39.6MB
-
MD5
9796d81cb5fb953823fe2e044a06cbae
-
SHA1
4ad0ada6265c729be745213451e2844320242d77
-
SHA256
2c660e1b097d166973b2336db271132b984e20432acdcc7bc203eb7f5057ec5c
-
SHA512
dca93379c066b999891f80ac6b4c721c7da1c19a1d00a5733a091fbd98b4c32a71194a0b08cc8773b66b43bf24dfcb666597e90d40fbfb4c83168b98b79fc9b9
-
SSDEEP
786432:CLQMH0mNG3yCo+45kFJ7RCkMhZn5CpxF54G8JqI166bQ4XiEKUAhPt22GcFw5maS:CUxuqVRCkMhZnspp4JfZkhhhgnk2w
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1