General
-
Target
DominikaSite.exe
-
Size
31.6MB
-
Sample
250213-1yccnawlbk
-
MD5
58468812e3014189976e7a0b5c6bea10
-
SHA1
8c249e234861f77808f5eaef0fcc732ac884deaa
-
SHA256
4da1512a9b71683b595fc89bbfdb2d520c38a23b6f6f3cd659522d124e771663
-
SHA512
184783dea41bab916422c2dafef948edd312c21cc32019dea1be5dee22996920bbb940975340f769995833af342c492f86dcdbc94e41e93ddb24dc3a13c9b855
-
SSDEEP
786432:96VdhW8X650bzcY876LBBWWS8vWjh4GCaRArVLih:UV7WU650nE76BBU7jhJ9OV
Behavioral task
behavioral1
Sample
DominikaSite.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral2
Sample
DominikaSite.exe
Resource
win11-20250210-en
Malware Config
Targets
-
-
Target
DominikaSite.exe
-
Size
31.6MB
-
MD5
58468812e3014189976e7a0b5c6bea10
-
SHA1
8c249e234861f77808f5eaef0fcc732ac884deaa
-
SHA256
4da1512a9b71683b595fc89bbfdb2d520c38a23b6f6f3cd659522d124e771663
-
SHA512
184783dea41bab916422c2dafef948edd312c21cc32019dea1be5dee22996920bbb940975340f769995833af342c492f86dcdbc94e41e93ddb24dc3a13c9b855
-
SSDEEP
786432:96VdhW8X650bzcY876LBBWWS8vWjh4GCaRArVLih:UV7WU650nE76BBU7jhJ9OV
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1