Larvaorient.7z
: The malware includes multiple layers of sandbox and analysis evasion, such as virtual machine detection (targeting VMware, VirtualBox, and QEMU) and anti-debugging checks. Indicators of Compromise (IoCs)
: Installation of CoinMiners to exploit system hardware for cryptocurrency mining. Delivery and Execution
: The malicious installers often appear identical to the legitimate 7-Zip software but silently drop additional binaries like hero.exe or upHreo.exe during installation. larvaorient.7z
: Strains like Gh0st RAT for full system control.
The "larvaorient.7z" package is frequently distributed through or fake app stores that mimic legitimate software like the official 7-Zip archive manager . : The malware includes multiple layers of sandbox
: Analysts have observed the group installing:
: The malware typically functions as proxyware , enrolling the infected host as a residential proxy node. This allows third parties to route potentially illegal traffic through the victim’s IP address for fraud or anonymity laundering. : Strains like Gh0st RAT for full system control
: Use of RDP Wrappers and additional backdoor accounts to maintain long-term access.
