General

  • Target

    https://cdn.discordapp.com/attachments/1309185645029228554/1309864039714783302/Release.zip?ex=67432173&is=6741cff3&hm=90f3ef27b699baba3c2ba99ebd0d73789a69c44434b227cff66ec041c25a0436&

  • Sample

    241123-p34rxs1paj

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1309185645029228554/1309864039714783302/Release.zip?ex=67432173&is=6741cff3&hm=90f3ef27b699baba3c2ba99ebd0d73789a69c44434b227cff66ec041c25a0436&

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks