General
-
Target
2023-08-23_98a4e75b4a808235a046afdaa0f7bbcf_mafia_magniber_JC.exe
-
Size
7.6MB
-
Sample
230907-wzsntacg9v
-
MD5
98a4e75b4a808235a046afdaa0f7bbcf
-
SHA1
aac097f65ec0b17bed7ec8aa5e59dd7287a16de9
-
SHA256
715d8ad908ea887da74e93b1f1e9bd0a953e38a9573b11c94a3b3d786d87dcf1
-
SHA512
453a559e6388acf582932ec186850f44650b8bb50ad15caa6b9eba585957b1cfb1d6d4df7e562cab394ac14829c3a1930ad18285a1c4f1b978f86f139e7a7ba8
-
SSDEEP
196608:51MW16htZgggx4ocFRteuU8kdRz6cL5yCIU5mPH9linvOz:51MW161gggKouRtboz6cVyU5mv9gnvOz
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-23_98a4e75b4a808235a046afdaa0f7bbcf_mafia_magniber_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-23_98a4e75b4a808235a046afdaa0f7bbcf_mafia_magniber_JC.exe
Resource
win10v2004-20230831-en
Malware Config
Targets
-
-
Target
2023-08-23_98a4e75b4a808235a046afdaa0f7bbcf_mafia_magniber_JC.exe
-
Size
7.6MB
-
MD5
98a4e75b4a808235a046afdaa0f7bbcf
-
SHA1
aac097f65ec0b17bed7ec8aa5e59dd7287a16de9
-
SHA256
715d8ad908ea887da74e93b1f1e9bd0a953e38a9573b11c94a3b3d786d87dcf1
-
SHA512
453a559e6388acf582932ec186850f44650b8bb50ad15caa6b9eba585957b1cfb1d6d4df7e562cab394ac14829c3a1930ad18285a1c4f1b978f86f139e7a7ba8
-
SSDEEP
196608:51MW16htZgggx4ocFRteuU8kdRz6cL5yCIU5mPH9linvOz:51MW161gggKouRtboz6cVyU5mv9gnvOz
Score10/10-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-