General

  • Target

    airflow.exe

  • Size

    17.3MB

  • Sample

    241001-wb4q6swdla

  • MD5

    77deeaff3649a34d162196ed4ebe0b8a

  • SHA1

    8c3cd0b28778c91fef045e9d994d3b15d610d377

  • SHA256

    e135364f4660a9de86a14ba7ed8bdc3fce5d4c6609518a1468ee54f5f703c15d

  • SHA512

    146d0507134df3668e8551c7430590925b7bdadc2a933e56f80766ddbad6696b7d0445ee72c050f4febba457b216044b16b5cf0c31bb56027b87641fa0995999

  • SSDEEP

    393216:vqarWfB3HThe34/6eE4xEyPwWlX4NI9SUMFxOrcCgpV:vsfJde32iSE+F4UMFei

Malware Config

Targets

    • Target

      airflow.exe

    • Size

      17.3MB

    • MD5

      77deeaff3649a34d162196ed4ebe0b8a

    • SHA1

      8c3cd0b28778c91fef045e9d994d3b15d610d377

    • SHA256

      e135364f4660a9de86a14ba7ed8bdc3fce5d4c6609518a1468ee54f5f703c15d

    • SHA512

      146d0507134df3668e8551c7430590925b7bdadc2a933e56f80766ddbad6696b7d0445ee72c050f4febba457b216044b16b5cf0c31bb56027b87641fa0995999

    • SSDEEP

      393216:vqarWfB3HThe34/6eE4xEyPwWlX4NI9SUMFxOrcCgpV:vsfJde32iSE+F4UMFei

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks