General
-
Target
source_prepared.exe
-
Size
88.3MB
-
Sample
250411-q9c38a1sdv
-
MD5
d8ae9a2634bc06c72205c5107dac8c84
-
SHA1
fed4e8e48945c802227f7eea7b0a7f16acf9b166
-
SHA256
155dbfc1ad45da20156863ffb2999aea4c6f2ce268c0622120d221824b4ab38c
-
SHA512
d268e395ee466fd1c26e2dbd20f31fa48fdb98ddb104e52bf36d6b06ff06458fded1d49a16bf84f7b7b11271144b4180b30db459f7d439bc961624ca58e3df30
-
SSDEEP
1572864:jtIupudNK/l1WLGP0OkiqOv8im2AK7E7lliCiYgj+h58sMwEAPDecJ5Af:aYoWbvMOknOv8i39ewM5QAPPA
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10ltsc2021-20250410-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
88.3MB
-
MD5
d8ae9a2634bc06c72205c5107dac8c84
-
SHA1
fed4e8e48945c802227f7eea7b0a7f16acf9b166
-
SHA256
155dbfc1ad45da20156863ffb2999aea4c6f2ce268c0622120d221824b4ab38c
-
SHA512
d268e395ee466fd1c26e2dbd20f31fa48fdb98ddb104e52bf36d6b06ff06458fded1d49a16bf84f7b7b11271144b4180b30db459f7d439bc961624ca58e3df30
-
SSDEEP
1572864:jtIupudNK/l1WLGP0OkiqOv8im2AK7E7lliCiYgj+h58sMwEAPDecJ5Af:aYoWbvMOknOv8i39ewM5QAPPA
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-