General
-
Target
3522d8fe0b3cb7126fcf9ab74405cd6bc29a93001bc23854941d90fc7fcf3390
-
Size
938KB
-
Sample
250218-1rvknazner
-
MD5
f8363b39122ec442ddf9d5064da011dd
-
SHA1
edc3a725b2e83e15d7f002b8fd249348e7725737
-
SHA256
3522d8fe0b3cb7126fcf9ab74405cd6bc29a93001bc23854941d90fc7fcf3390
-
SHA512
e9e4eb4675ab3f5ec8653f5b131b3d2f4c74b4bf2208fceecf87b707e54adbb8107b5ce4f3339297e88f58aaf1bce46ed1631ae03e99f8143672e1c264392a3c
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aeKl:6TvC/MTQYxsWR7aeK
Static task
static1
Behavioral task
behavioral1
Sample
3522d8fe0b3cb7126fcf9ab74405cd6bc29a93001bc23854941d90fc7fcf3390.exe
Resource
win7-20241010-en
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/defend/random.exe
Targets
-
-
Target
3522d8fe0b3cb7126fcf9ab74405cd6bc29a93001bc23854941d90fc7fcf3390
-
Size
938KB
-
MD5
f8363b39122ec442ddf9d5064da011dd
-
SHA1
edc3a725b2e83e15d7f002b8fd249348e7725737
-
SHA256
3522d8fe0b3cb7126fcf9ab74405cd6bc29a93001bc23854941d90fc7fcf3390
-
SHA512
e9e4eb4675ab3f5ec8653f5b131b3d2f4c74b4bf2208fceecf87b707e54adbb8107b5ce4f3339297e88f58aaf1bce46ed1631ae03e99f8143672e1c264392a3c
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aeKl:6TvC/MTQYxsWR7aeK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Windows security modification
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2