General
-
Target
Primordial
-
Size
278KB
-
Sample
241023-v59nvathqp
-
MD5
2a9b4a529201c22df2f07f1a487f779a
-
SHA1
71f8186cd8c89d6a0547bbaa9abe882b53382eb8
-
SHA256
8f6da90ca708d4002e479df3298857f2014cac9678269de715d58b048724256b
-
SHA512
b4798629e8388899fac10ddb04e37e66e8b5964a6d4569e32aa12a2f0a23974ac0647d0568bab06c9611ce32f1bc90f803abbbbbbe0294f513c863613e62a25e
-
SSDEEP
6144:sFouqpOL/saqkPV9FemLtcsDSsmw/9lvZJT3CqbMrhryf65NRPaCieMjAkvCJv10:MouqpOL/saqkPV9FemLtcsDSsmw/9lvd
Static task
static1
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7461409177:AAHMv-EtRWu0uEGj_eiICpHa8RT1JBvjytE/sendMessage?chat_id=7179640777
Targets
-
-
Target
Primordial
-
Size
278KB
-
MD5
2a9b4a529201c22df2f07f1a487f779a
-
SHA1
71f8186cd8c89d6a0547bbaa9abe882b53382eb8
-
SHA256
8f6da90ca708d4002e479df3298857f2014cac9678269de715d58b048724256b
-
SHA512
b4798629e8388899fac10ddb04e37e66e8b5964a6d4569e32aa12a2f0a23974ac0647d0568bab06c9611ce32f1bc90f803abbbbbbe0294f513c863613e62a25e
-
SSDEEP
6144:sFouqpOL/saqkPV9FemLtcsDSsmw/9lvZJT3CqbMrhryf65NRPaCieMjAkvCJv10:MouqpOL/saqkPV9FemLtcsDSsmw/9lvd
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1