Resubmissions
19-02-2025 19:28
250219-x6rwjaxkb1 10General
-
Target
havefunfpsbooster.exe
-
Size
82.4MB
-
Sample
250219-dywpzaxqt3
-
MD5
6a50b0b40ad025606e9a88fe47b8afdb
-
SHA1
915fa9d53c8ef8361c01a26aa91c47b999014b49
-
SHA256
9f28fbfcd8096c7780ffba113cb7a9b9c9d9f12e996237aa165e1a645c17867d
-
SHA512
7c058dbeb5cb259f796f201714771b5f406846756a92fc9eecf6d7fb93f238380a2d3ebb91aca578adab261099003b65202c3fab186d3883fd719af6ba5a6ed4
-
SSDEEP
1572864:ln21lWiWXwOkiqOv8im2A6WE7a6ln2iYKrhbOoAk6BUqphQavCR9WeF:lMgiQwOknOv8i35i6lLrFoFUqphQaqRU
Behavioral task
behavioral1
Sample
havefunfpsbooster.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
havefunfpsbooster.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
havefunfpsbooster.exe
-
Size
82.4MB
-
MD5
6a50b0b40ad025606e9a88fe47b8afdb
-
SHA1
915fa9d53c8ef8361c01a26aa91c47b999014b49
-
SHA256
9f28fbfcd8096c7780ffba113cb7a9b9c9d9f12e996237aa165e1a645c17867d
-
SHA512
7c058dbeb5cb259f796f201714771b5f406846756a92fc9eecf6d7fb93f238380a2d3ebb91aca578adab261099003b65202c3fab186d3883fd719af6ba5a6ed4
-
SSDEEP
1572864:ln21lWiWXwOkiqOv8im2A6WE7a6ln2iYKrhbOoAk6BUqphQavCR9WeF:lMgiQwOknOv8i35i6lLrFoFUqphQaqRU
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-