General
-
Target
Injector.exe
-
Size
68.8MB
-
Sample
250224-l6y43awnx2
-
MD5
c43cf791c9a67e57d78f47177b73db5e
-
SHA1
d211284c160cc7544d8c1ddcd22aef52e066165c
-
SHA256
311ce15734609d5f53c8ad1901be1373f233abbb23d7f11c330cb921d39ae54d
-
SHA512
3408552e9e56f6d0cc5d2a21d91702bb93d3b86f3c243979184df56bdb7ba326df341b69cd39b40f2cebe0851edc1b2975ef2d02e687167971b5be32dfea3ac2
-
SSDEEP
1572864:RfcQtIe3iirAH8+1osuTCSxOB6xMLiIpz2qHWB75il+WBZo0Wo4Dxo:tciiS6xjKcBa6R2qHO5izBW0zCO
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Injector.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Injector.exe
-
Size
68.8MB
-
MD5
c43cf791c9a67e57d78f47177b73db5e
-
SHA1
d211284c160cc7544d8c1ddcd22aef52e066165c
-
SHA256
311ce15734609d5f53c8ad1901be1373f233abbb23d7f11c330cb921d39ae54d
-
SHA512
3408552e9e56f6d0cc5d2a21d91702bb93d3b86f3c243979184df56bdb7ba326df341b69cd39b40f2cebe0851edc1b2975ef2d02e687167971b5be32dfea3ac2
-
SSDEEP
1572864:RfcQtIe3iirAH8+1osuTCSxOB6xMLiIpz2qHWB75il+WBZo0Wo4Dxo:tciiS6xjKcBa6R2qHO5izBW0zCO
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-