General
-
Target
SpoofedBootsrapperNew.exe
-
Size
58.8MB
-
Sample
250417-l9dbrswk19
-
MD5
ba13fdced20484f631aa55abac784192
-
SHA1
cfd9104e6c8572c47c7f2e21b80e5b58a4f1f67b
-
SHA256
22393f41029b96d9030cc27552c69d0961c5f100595ff620db90717fef8617c6
-
SHA512
23502a391b9b77b6a2fd5c880f95b218a8ba0061a44b49ecb0ab1d4acdf2e71f453afca326060fc7b8a11c0d2a59321396dbf058136c117d843b09cb5a2170d6
-
SSDEEP
1572864:QAtIupuYml9KWALP4OkiqOv8im2A3+TXE7flhe7fE17I6XX2UL:QPYievLgOknOv8i36+T4LP17vXX2+
Behavioral task
behavioral1
Sample
SpoofedBootsrapperNew.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
SpoofedBootsrapperNew.exe
Resource
win11-20250411-en
Malware Config
Targets
-
-
Target
SpoofedBootsrapperNew.exe
-
Size
58.8MB
-
MD5
ba13fdced20484f631aa55abac784192
-
SHA1
cfd9104e6c8572c47c7f2e21b80e5b58a4f1f67b
-
SHA256
22393f41029b96d9030cc27552c69d0961c5f100595ff620db90717fef8617c6
-
SHA512
23502a391b9b77b6a2fd5c880f95b218a8ba0061a44b49ecb0ab1d4acdf2e71f453afca326060fc7b8a11c0d2a59321396dbf058136c117d843b09cb5a2170d6
-
SSDEEP
1572864:QAtIupuYml9KWALP4OkiqOv8im2A3+TXE7flhe7fE17I6XX2UL:QPYievLgOknOv8i36+T4LP17vXX2+
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-