General
-
Target
source_prepared.exe
-
Size
87.5MB
-
Sample
250410-q36f7atky4
-
MD5
2b5616a643b30c844d6bb8af471f3a66
-
SHA1
c1694607c6cb94a5afa2c08aef9b8d97e8d4fdf6
-
SHA256
4f49fc76582fc10a03c7f6bd9dd7a0043eca3e7bb9b8f268b40f7aadfec9f2ee
-
SHA512
54b953b05e117b3cb0d8b055b53f525a21e9496b576d6f2caf15517f409e3b2db0cf7ebd111f1c9a2e09326dc71020073cc1f875cd5b5e092693b658b92a7289
-
SSDEEP
1572864:0tIupudNK/lgWjcP0OkiqOv8im2AzOE7fbli0GiYgj+h58sMwM8DQGe:LYoWirMOknOv8i3mTw0Y5QE
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
87.5MB
-
MD5
2b5616a643b30c844d6bb8af471f3a66
-
SHA1
c1694607c6cb94a5afa2c08aef9b8d97e8d4fdf6
-
SHA256
4f49fc76582fc10a03c7f6bd9dd7a0043eca3e7bb9b8f268b40f7aadfec9f2ee
-
SHA512
54b953b05e117b3cb0d8b055b53f525a21e9496b576d6f2caf15517f409e3b2db0cf7ebd111f1c9a2e09326dc71020073cc1f875cd5b5e092693b658b92a7289
-
SSDEEP
1572864:0tIupudNK/lgWjcP0OkiqOv8im2AzOE7fbli0GiYgj+h58sMwM8DQGe:LYoWirMOknOv8i3mTw0Y5QE
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-