General

  • Target

    https://cdn.discordapp.com/attachments/1250279277052825691/1250283581499113503/Loader.exe?ex=666a60d2&is=66690f52&hm=7ba0d1e22edbbb85150a5d2958d8433611410ea71c7ca851ccfc49cad7059f62&

  • Sample

    240612-dkgc5azbkq

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1250279277052825691/1250283581499113503/Loader.exe?ex=666a60d2&is=66690f52&hm=7ba0d1e22edbbb85150a5d2958d8433611410ea71c7ca851ccfc49cad7059f62&

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks