General

  • Target

    random.exe

  • Size

    938KB

  • Sample

    250207-ta64ssxkd1

  • MD5

    35175480aaf58a493e68cb0adc722d8b

  • SHA1

    2b59ac7beda4cab50a10b0ea9a787c33151cd723

  • SHA256

    2e5e065dd96bc73491747ef2163358f9d8dd21a09f828d3d83adc5cb9a5ddafd

  • SHA512

    18b54f47363bd68636b2bab867226dca0233bceada0c06cc32487a1adcf28dc6003490fe1fe77d2ad25a876a36f0c589d5597b13dd4d1a3182ab6cb68f91f29d

  • SSDEEP

    24576:QqDEvCTbMWu7rQYlBQcBiT6rprG8aejl:QTvC/MTQYxsWR7aej

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Targets

    • Target

      random.exe

    • Size

      938KB

    • MD5

      35175480aaf58a493e68cb0adc722d8b

    • SHA1

      2b59ac7beda4cab50a10b0ea9a787c33151cd723

    • SHA256

      2e5e065dd96bc73491747ef2163358f9d8dd21a09f828d3d83adc5cb9a5ddafd

    • SHA512

      18b54f47363bd68636b2bab867226dca0233bceada0c06cc32487a1adcf28dc6003490fe1fe77d2ad25a876a36f0c589d5597b13dd4d1a3182ab6cb68f91f29d

    • SSDEEP

      24576:QqDEvCTbMWu7rQYlBQcBiT6rprG8aejl:QTvC/MTQYxsWR7aej

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks