General

  • Target

    CowabungaLite.exe

  • Size

    1.6MB

  • Sample

    241002-1q36eayfqr

  • MD5

    d6bbe9dafd2eb186b22d00ea70d8631e

  • SHA1

    09dd6d51844fd854e50cbe7fc10fae80ea2aa911

  • SHA256

    07b712079547d394a8f6e6e30fce99fa6dded98135d1529aaca062220a0b1cdf

  • SHA512

    85474bb17ec1887d4769819ad9685cfca4d2d900b8e5ece9cc70d3888c36816fa225863aa7b5f0fd137339faa884b8b8791a209d3957cf774bce02bf2cd31248

  • SSDEEP

    24576:/C83r12mGC35Fngc2AW11HCqryl7BqbpSqlBbaTr8q:/C83r4mxxgc25jzrv7aTr8q

Malware Config

Targets

    • Target

      CowabungaLite.exe

    • Size

      1.6MB

    • MD5

      d6bbe9dafd2eb186b22d00ea70d8631e

    • SHA1

      09dd6d51844fd854e50cbe7fc10fae80ea2aa911

    • SHA256

      07b712079547d394a8f6e6e30fce99fa6dded98135d1529aaca062220a0b1cdf

    • SHA512

      85474bb17ec1887d4769819ad9685cfca4d2d900b8e5ece9cc70d3888c36816fa225863aa7b5f0fd137339faa884b8b8791a209d3957cf774bce02bf2cd31248

    • SSDEEP

      24576:/C83r12mGC35Fngc2AW11HCqryl7BqbpSqlBbaTr8q:/C83r4mxxgc25jzrv7aTr8q

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks