General

  • Target

    Catalyst.exe

  • Size

    14.0MB

  • Sample

    240530-f22fqsha87

  • MD5

    b765109a6a7d339473b61ab9a759aa0e

  • SHA1

    ade52ded8366094eee9d2a5827bfe45b3b7a977b

  • SHA256

    b5e63f3bbfc75de4da25277b7a9fa0b650e8e2bc72c2af0087bd09698a9d098d

  • SHA512

    ff813e628761d8ac3ee433fcf40dfaac26dd25ae7ac5ce1680c851e4dc9c69398590007043e2eebe5da0e407c917320cea46782bed072ed72f7d3826f868292d

  • SSDEEP

    393216:aamtGGrfI/5ONXPeDELqPV7gvjZmqyrdUzeP:3GrfqINX5Lqpgr8qyOzeP

Malware Config

Targets

    • Target

      Catalyst.exe

    • Size

      14.0MB

    • MD5

      b765109a6a7d339473b61ab9a759aa0e

    • SHA1

      ade52ded8366094eee9d2a5827bfe45b3b7a977b

    • SHA256

      b5e63f3bbfc75de4da25277b7a9fa0b650e8e2bc72c2af0087bd09698a9d098d

    • SHA512

      ff813e628761d8ac3ee433fcf40dfaac26dd25ae7ac5ce1680c851e4dc9c69398590007043e2eebe5da0e407c917320cea46782bed072ed72f7d3826f868292d

    • SSDEEP

      393216:aamtGGrfI/5ONXPeDELqPV7gvjZmqyrdUzeP:3GrfqINX5Lqpgr8qyOzeP

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks