General

  • Target

    83d49a58f4c4910aed8ca2c8235a4008faf8895785a1efb8580fdd6f03ae0ef9.exe

  • Size

    938KB

  • Sample

    250216-dajqhayjem

  • MD5

    91c52c6849af5fe67eb447e6ad66556f

  • SHA1

    1ebf8b013ae9b52326be7196f4a04ab4aae3451c

  • SHA256

    83d49a58f4c4910aed8ca2c8235a4008faf8895785a1efb8580fdd6f03ae0ef9

  • SHA512

    8a90802fa783c434307c42b84d599e779e2582387f4349074429ff1aa9df2059ec2fffd723ac7e1be2d8fecbfb0cc450f5c9a78108acfd9c4d407c777e07d6e6

  • SSDEEP

    24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aesl:sTvC/MTQYxsWR7aes

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Targets

    • Target

      83d49a58f4c4910aed8ca2c8235a4008faf8895785a1efb8580fdd6f03ae0ef9.exe

    • Size

      938KB

    • MD5

      91c52c6849af5fe67eb447e6ad66556f

    • SHA1

      1ebf8b013ae9b52326be7196f4a04ab4aae3451c

    • SHA256

      83d49a58f4c4910aed8ca2c8235a4008faf8895785a1efb8580fdd6f03ae0ef9

    • SHA512

      8a90802fa783c434307c42b84d599e779e2582387f4349074429ff1aa9df2059ec2fffd723ac7e1be2d8fecbfb0cc450f5c9a78108acfd9c4d407c777e07d6e6

    • SSDEEP

      24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aesl:sTvC/MTQYxsWR7aes

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks