General
-
Target
dec62c60d202cb01dc6da521280b1cb78dfb1a2e17ef55251346fdf178471369.exe
-
Size
938KB
-
Sample
250217-esdsmszmay
-
MD5
281d0718e6a1ea68a009c360934d49f4
-
SHA1
992de4a281d603d13b5596d2d6aaacd7ed68cf7b
-
SHA256
dec62c60d202cb01dc6da521280b1cb78dfb1a2e17ef55251346fdf178471369
-
SHA512
7ebb2297d46a9bd4a7531a210882565472fcf89b6a448910e5d9358380c92ade9fc5a04e9edff2146e76cc6dbbbe49609f8b8e07146bb1a22f26707dabba921e
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aeNlj:4TvC/MTQYxsWR7aeNF
Static task
static1
Behavioral task
behavioral1
Sample
dec62c60d202cb01dc6da521280b1cb78dfb1a2e17ef55251346fdf178471369.exe
Resource
win7-20240903-en
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Targets
-
-
Target
dec62c60d202cb01dc6da521280b1cb78dfb1a2e17ef55251346fdf178471369.exe
-
Size
938KB
-
MD5
281d0718e6a1ea68a009c360934d49f4
-
SHA1
992de4a281d603d13b5596d2d6aaacd7ed68cf7b
-
SHA256
dec62c60d202cb01dc6da521280b1cb78dfb1a2e17ef55251346fdf178471369
-
SHA512
7ebb2297d46a9bd4a7531a210882565472fcf89b6a448910e5d9358380c92ade9fc5a04e9edff2146e76cc6dbbbe49609f8b8e07146bb1a22f26707dabba921e
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aeNlj:4TvC/MTQYxsWR7aeNF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Windows security modification
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2