General
-
Target
VlqT4JA.exe
-
Size
86.9MB
-
Sample
250208-y1r5sa1rbv
-
MD5
563a8ce631eefab6ee7d1f2553980ca0
-
SHA1
c993410884ce86bbe338729ad86d2202d180c285
-
SHA256
b42587626804bf5ef18e4f23bf5c1cdbce0018007013d425de191d8a99d05685
-
SHA512
3899353d550939b48c879ef2fed0adcffb64fcb3fa7f21fd9538f9c695dbbfa1aa3cb797072c6ac7d23c58a5b6a0322e863b54a80f93883e20609f96b2f77757
-
SSDEEP
1572864:K2GKl+WdZsm/OkiqOv8im2A+79E7olitnnBiYgj+h58sMwA3e3VilcJ5Vrh:KnK4ssm/OknOv8i3J7pwpT503e3VhV
Behavioral task
behavioral1
Sample
VlqT4JA.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
VlqT4JA.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
VlqT4JA.exe
-
Size
86.9MB
-
MD5
563a8ce631eefab6ee7d1f2553980ca0
-
SHA1
c993410884ce86bbe338729ad86d2202d180c285
-
SHA256
b42587626804bf5ef18e4f23bf5c1cdbce0018007013d425de191d8a99d05685
-
SHA512
3899353d550939b48c879ef2fed0adcffb64fcb3fa7f21fd9538f9c695dbbfa1aa3cb797072c6ac7d23c58a5b6a0322e863b54a80f93883e20609f96b2f77757
-
SSDEEP
1572864:K2GKl+WdZsm/OkiqOv8im2A+79E7olitnnBiYgj+h58sMwA3e3VilcJ5Vrh:KnK4ssm/OknOv8i3J7pwpT503e3VhV
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1