General

  • Target

    loader.exe

  • Size

    15.7MB

  • Sample

    240619-3fe2yawgrd

  • MD5

    e91ec77475d05260c942e6efde6a8d9a

  • SHA1

    d64e17d927269fa6504151dc716a5284312bf2b8

  • SHA256

    a5449049022450ee54e4ef25e216f81adfc6e65f8b88b92f097145c29e092424

  • SHA512

    50ffb259d564ed43958cce305a0a2e3b88563024440a28617bdc2a7d325e949b1cd5edd028d833f35db030050a0c77a2d3d066483e9b77639954549fc78cf817

  • SSDEEP

    393216:fYS0xa+FHFq5D95hRykUSx6/FlZOshouIkPftRL54YRJ:fYS0TFlqxhRykUSxA30wouTtRLz

Malware Config

Targets

    • Target

      loader.exe

    • Size

      15.7MB

    • MD5

      e91ec77475d05260c942e6efde6a8d9a

    • SHA1

      d64e17d927269fa6504151dc716a5284312bf2b8

    • SHA256

      a5449049022450ee54e4ef25e216f81adfc6e65f8b88b92f097145c29e092424

    • SHA512

      50ffb259d564ed43958cce305a0a2e3b88563024440a28617bdc2a7d325e949b1cd5edd028d833f35db030050a0c77a2d3d066483e9b77639954549fc78cf817

    • SSDEEP

      393216:fYS0xa+FHFq5D95hRykUSx6/FlZOshouIkPftRL54YRJ:fYS0TFlqxhRykUSxA30wouTtRLz

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks