General

  • Target

    g7935047.exe

  • Size

    236KB

  • Sample

    230919-hmzdyahd85

  • MD5

    ae3c2011e6b28a83ed5ec20506e2e3eb

  • SHA1

    34bcdb009271f3301b37346648ade33ceecf9556

  • SHA256

    797cfa22728210b5dfc1b746fda10be7684798629c168664d754440882c5dbcf

  • SHA512

    8c8f8a783cd2fa9de0a23735c958dab8563b7f100e77c3e821287a7a07d05db398dd2a3a00b447c11b34d89b0c48ef497a869003582159e7e6c134bba6cd3138

  • SSDEEP

    6144:1hrjEl2jicP5iOo2T8VrSd/sUAOt2lC1Sa:1hrMqiG59ouf2Q1Sa

Malware Config

Targets

    • Target

      g7935047.exe

    • Size

      236KB

    • MD5

      ae3c2011e6b28a83ed5ec20506e2e3eb

    • SHA1

      34bcdb009271f3301b37346648ade33ceecf9556

    • SHA256

      797cfa22728210b5dfc1b746fda10be7684798629c168664d754440882c5dbcf

    • SHA512

      8c8f8a783cd2fa9de0a23735c958dab8563b7f100e77c3e821287a7a07d05db398dd2a3a00b447c11b34d89b0c48ef497a869003582159e7e6c134bba6cd3138

    • SSDEEP

      6144:1hrjEl2jicP5iOo2T8VrSd/sUAOt2lC1Sa:1hrMqiG59ouf2Q1Sa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Tasks