General
-
Target
source_prepared.exe
-
Size
81.8MB
-
Sample
250415-fggktsyjw4
-
MD5
e91b93446f017b6bbf37843739e14da2
-
SHA1
7a9d955e329ce9ce00c7e99765169f72c5089dd2
-
SHA256
5eb333dcb2e811847c14f33535fe3ae897a4bc64448fd1ae93be32e09f76b3a4
-
SHA512
83a95f7c532716b80ea548d90dba870429623447bb9ae7748a9e50be52c6c38e14bc533fced84cb7788132ee4b9f9748574b48525ba71e600bdc05eed0fa7e33
-
SSDEEP
1572864:xtIupuQ/rKUJlAGWGPdOkiqOv8im2A69E7EZlnGiYKrhbOoAkNZPq63HWWl:4Yd/BJRbVOknOv8i35HZlbrFo0Pb3HW
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
81.8MB
-
MD5
e91b93446f017b6bbf37843739e14da2
-
SHA1
7a9d955e329ce9ce00c7e99765169f72c5089dd2
-
SHA256
5eb333dcb2e811847c14f33535fe3ae897a4bc64448fd1ae93be32e09f76b3a4
-
SHA512
83a95f7c532716b80ea548d90dba870429623447bb9ae7748a9e50be52c6c38e14bc533fced84cb7788132ee4b9f9748574b48525ba71e600bdc05eed0fa7e33
-
SSDEEP
1572864:xtIupuQ/rKUJlAGWGPdOkiqOv8im2A69E7EZlnGiYKrhbOoAkNZPq63HWWl:4Yd/BJRbVOknOv8i35HZlbrFo0Pb3HW
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-