General
-
Target
source_prepared.exe
-
Size
59.7MB
-
Sample
250214-wgfarswjen
-
MD5
ec591bd84a93518bbabcca6490db9d7f
-
SHA1
b1b1eea638ec5e1630532fc6af8b845672818da1
-
SHA256
c329a1a274a50588a935fdbf6b5f79fd64ae78ec5b55a9614915e48ab316e82e
-
SHA512
ce363990f40e99d1f93a7b7fa38bcda0e0bcf95cefe025061f19ecc816f94ab77207df3647d747d09bee5738a1c1bc7464d38c1c057aa8c4067113196349d6d7
-
SSDEEP
1572864:uVjl9KW561RnOkiqOv8im2A3+TUE7glSe7fEoI6XhK2zjIH:6ed1RnOknOv8i36+Tm8PovXQdH
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
59.7MB
-
MD5
ec591bd84a93518bbabcca6490db9d7f
-
SHA1
b1b1eea638ec5e1630532fc6af8b845672818da1
-
SHA256
c329a1a274a50588a935fdbf6b5f79fd64ae78ec5b55a9614915e48ab316e82e
-
SHA512
ce363990f40e99d1f93a7b7fa38bcda0e0bcf95cefe025061f19ecc816f94ab77207df3647d747d09bee5738a1c1bc7464d38c1c057aa8c4067113196349d6d7
-
SSDEEP
1572864:uVjl9KW561RnOkiqOv8im2A3+TUE7glSe7fEoI6XhK2zjIH:6ed1RnOknOv8i36+Tm8PovXQdH
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1