General
-
Target
Spoofer (untested).exe
-
Size
24.5MB
-
Sample
250223-eql18swmhw
-
MD5
fc028c5f1a875995dbdd5b2893e9822f
-
SHA1
3346c5180cff457c73c432ff016f15c045c17551
-
SHA256
52311bb93549afa22033947907157c3cfaf62df20a63ca2fbe8de9b4a66741d4
-
SHA512
e01413a31798aa9c2c61126501aef6e6d5413915cea59a4414be52c9f86cc9c71ccd3f99356c693b21056cab842055db27077b7fcf5cc14335e925686bf2c02e
-
SSDEEP
393216:262L62LqCeYw5OtW8avSiIZA0dfY8so9L/gmiVOdlVJIe:jowIW8cqflsoN/FRlVWe
Behavioral task
behavioral1
Sample
Spoofer (untested).exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Spoofer (untested).exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Spoofer (untested).exe
-
Size
24.5MB
-
MD5
fc028c5f1a875995dbdd5b2893e9822f
-
SHA1
3346c5180cff457c73c432ff016f15c045c17551
-
SHA256
52311bb93549afa22033947907157c3cfaf62df20a63ca2fbe8de9b4a66741d4
-
SHA512
e01413a31798aa9c2c61126501aef6e6d5413915cea59a4414be52c9f86cc9c71ccd3f99356c693b21056cab842055db27077b7fcf5cc14335e925686bf2c02e
-
SSDEEP
393216:262L62LqCeYw5OtW8avSiIZA0dfY8so9L/gmiVOdlVJIe:jowIW8cqflsoN/FRlVWe
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-