General

  • Target

    99f157621c990c39d06dc382f4755360c55eab77bb1a192e50aeaa18d1da6ea3.exe

  • Size

    1.8MB

  • Sample

    250207-fzhkvazngs

  • MD5

    10cd3ebe6be3397f2c4b391d682692a5

  • SHA1

    02e5bbe848b94b8d2cf406ac83490aa32ee33520

  • SHA256

    99f157621c990c39d06dc382f4755360c55eab77bb1a192e50aeaa18d1da6ea3

  • SHA512

    42a7f0cdd08e2d8be5d74ec53d61e346ef9c377890dc08e96941c94797e0aa26dfbd1536e3286486265e5a365886e35ee17c7c94adec2485f8541b3beb493624

  • SSDEEP

    24576:ClHxk5TzGRg8UYRJm1AdT1omYW4q+ESaFuGN3t3LDDJKgw/40JlkQUi+5RGL/Df+:eW5mRg32VShqXDFuut7a40TWudT4

Malware Config

Targets

    • Target

      99f157621c990c39d06dc382f4755360c55eab77bb1a192e50aeaa18d1da6ea3.exe

    • Size

      1.8MB

    • MD5

      10cd3ebe6be3397f2c4b391d682692a5

    • SHA1

      02e5bbe848b94b8d2cf406ac83490aa32ee33520

    • SHA256

      99f157621c990c39d06dc382f4755360c55eab77bb1a192e50aeaa18d1da6ea3

    • SHA512

      42a7f0cdd08e2d8be5d74ec53d61e346ef9c377890dc08e96941c94797e0aa26dfbd1536e3286486265e5a365886e35ee17c7c94adec2485f8541b3beb493624

    • SSDEEP

      24576:ClHxk5TzGRg8UYRJm1AdT1omYW4q+ESaFuGN3t3LDDJKgw/40JlkQUi+5RGL/Df+:eW5mRg32VShqXDFuut7a40TWudT4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks