General
-
Target
source_prepared.exe
-
Size
88.7MB
-
Sample
250319-t1425aywfy
-
MD5
0d0ff2f9a6d62d97d099052be2f9f009
-
SHA1
7065d67c1c65049fe5bb736e61ed66d00bc7279e
-
SHA256
ee12abab06c2bd2c24c4b5d33c3d034301aa2e4ad72cac04b5f9d0e38b81c7b9
-
SHA512
559be72dffa913efbb93ba2d9c5127ab420287df134ef61172c0d6dfb74e053a9d5c7aad84b9e834d253d59562439886045abc61128377d65aaac298b4fc78d8
-
SSDEEP
1572864:TtIupudNK/lXAbWNPgOkiqOv8im2A3+TbE7GliXiYgj+h58sMw5IcPzIcJFJZ:KYoWRogYOknOv8i36+TNwp5FBP9J
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20250313-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
88.7MB
-
MD5
0d0ff2f9a6d62d97d099052be2f9f009
-
SHA1
7065d67c1c65049fe5bb736e61ed66d00bc7279e
-
SHA256
ee12abab06c2bd2c24c4b5d33c3d034301aa2e4ad72cac04b5f9d0e38b81c7b9
-
SHA512
559be72dffa913efbb93ba2d9c5127ab420287df134ef61172c0d6dfb74e053a9d5c7aad84b9e834d253d59562439886045abc61128377d65aaac298b4fc78d8
-
SSDEEP
1572864:TtIupudNK/lXAbWNPgOkiqOv8im2A3+TbE7GliXiYgj+h58sMw5IcPzIcJFJZ:KYoWRogYOknOv8i36+TNwp5FBP9J
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1