General
-
Target
trigger bot.exe
-
Size
24.5MB
-
Sample
250223-fe3qaaxpap
-
MD5
3c04d21641b0a4328af9d730640686dd
-
SHA1
8cee6d77df0319f4afa07bc5266ef99c7bc332e3
-
SHA256
87b774f3210ce1ab79531cf3e39e8d13d0f90412e70c49d66400c996a36d57ce
-
SHA512
9639466109020d293b8b501ab554075daa337e8f89138ab5d642f0b07d494bf3cac3ad363547ae12bee135021283da24fe130b112497fd8818fef2f5e6cbe835
-
SSDEEP
393216:ZB42L62LqCeYw5OtW8KovSiIZA0dfY8so9L/gmiVOdlVJIe:zoowIW8KuqflsoN/FRlVWe
Behavioral task
behavioral1
Sample
trigger bot.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
trigger bot.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
trigger bot.exe
-
Size
24.5MB
-
MD5
3c04d21641b0a4328af9d730640686dd
-
SHA1
8cee6d77df0319f4afa07bc5266ef99c7bc332e3
-
SHA256
87b774f3210ce1ab79531cf3e39e8d13d0f90412e70c49d66400c996a36d57ce
-
SHA512
9639466109020d293b8b501ab554075daa337e8f89138ab5d642f0b07d494bf3cac3ad363547ae12bee135021283da24fe130b112497fd8818fef2f5e6cbe835
-
SSDEEP
393216:ZB42L62LqCeYw5OtW8KovSiIZA0dfY8so9L/gmiVOdlVJIe:zoowIW8KuqflsoN/FRlVWe
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-