General
-
Target
source_prepared.exe
-
Size
86.9MB
-
Sample
250210-p5xrdssrhx
-
MD5
7101ab3efaf3baf5c615b9d6d111fdf6
-
SHA1
ebef4c414ef1b3811e674a3cab69ff99fa984839
-
SHA256
e92cd8e53a7a0f1240cf674c1834be4085ffac351d568f287c5cedb6b5cbd036
-
SHA512
81e65189f8f0b76bd03f53ded4c2c5ad99079724282dc110e28ae4975c8c9a7e9456527f6ed113dfd7fb105e649891cbda29de66039852502c1c68df12222f35
-
SSDEEP
1572864:t2GKl+WXr8sm/OkiqOv8im2A+79E7olitnnBiYgj+h58sMwA3e3VilcJ5Vrh:tnK4Dsm/OknOv8i3J7pwpT503e3VhV
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
86.9MB
-
MD5
7101ab3efaf3baf5c615b9d6d111fdf6
-
SHA1
ebef4c414ef1b3811e674a3cab69ff99fa984839
-
SHA256
e92cd8e53a7a0f1240cf674c1834be4085ffac351d568f287c5cedb6b5cbd036
-
SHA512
81e65189f8f0b76bd03f53ded4c2c5ad99079724282dc110e28ae4975c8c9a7e9456527f6ed113dfd7fb105e649891cbda29de66039852502c1c68df12222f35
-
SSDEEP
1572864:t2GKl+WXr8sm/OkiqOv8im2A+79E7olitnnBiYgj+h58sMwA3e3VilcJ5Vrh:tnK4Dsm/OknOv8i3J7pwpT503e3VhV
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1