VIRTUALGATE

Description

(Mandiant) The Windows guest virtual machines which were hosted by the infected hypervisors also contained a unique malware sample located at C:\Windows\Temp\avp.exe. This malware, which we refer to as VIRTUALGATE, is a utility program written in C that is comprised of two (2) parts, a dropper, and the payload. The memory only dropper deobfuscates a second stage DLL payload that uses VMware’s virtual machine communication interface (VMCI) sockets to run commands on a guest virtual machine from a hypervisor host, or between guest virtual machines on the same host.

Names

Name
VIRTUALGATE

Category

Malware

Type

  • Dropper

Information

Malpedia

Other Information

Uuid

bab2da7c-d096-486f-acb5-a7bae7d53afc

Last Card Change

2024-08-27