General

  • Target

    Immortal Woofer.exe

  • Size

    151.1MB

  • Sample

    240906-r7bm2ssbnl

  • MD5

    b3a420741d0c3ef020daa5332bcba7b6

  • SHA1

    fab88334908bd6ac99ae2e98c7aa7b7412ebfc7d

  • SHA256

    035a82de22713080aa43c483c1c1cef63b827bd575a0486996f3a70ce5477e49

  • SHA512

    12b7af549557e9b705d4a11bdc023dcd2cab2dcb8673bb359a2ccfa284567f17fa9e97142352f416bc2b0edf198e56d900c69644198822fb16205fc98282f8e6

  • SSDEEP

    786432:UPKYRuO3mOTgbr/skQsh/SgaNkbks5GoE3yKZ1fX36n:UPKCuO3mSgfkCKqksYoE3ySA

Malware Config

Targets

    • Target

      Immortal Woofer.exe

    • Size

      151.1MB

    • MD5

      b3a420741d0c3ef020daa5332bcba7b6

    • SHA1

      fab88334908bd6ac99ae2e98c7aa7b7412ebfc7d

    • SHA256

      035a82de22713080aa43c483c1c1cef63b827bd575a0486996f3a70ce5477e49

    • SHA512

      12b7af549557e9b705d4a11bdc023dcd2cab2dcb8673bb359a2ccfa284567f17fa9e97142352f416bc2b0edf198e56d900c69644198822fb16205fc98282f8e6

    • SSDEEP

      786432:UPKYRuO3mOTgbr/skQsh/SgaNkbks5GoE3yKZ1fX36n:UPKCuO3mSgfkCKqksYoE3ySA

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks