General

  • Target

    2023-08-23_98a4e75b4a808235a046afdaa0f7bbcf_mafia_magniber_JC.exe

  • Size

    7.6MB

  • Sample

    230907-wzsntacg9v

  • MD5

    98a4e75b4a808235a046afdaa0f7bbcf

  • SHA1

    aac097f65ec0b17bed7ec8aa5e59dd7287a16de9

  • SHA256

    715d8ad908ea887da74e93b1f1e9bd0a953e38a9573b11c94a3b3d786d87dcf1

  • SHA512

    453a559e6388acf582932ec186850f44650b8bb50ad15caa6b9eba585957b1cfb1d6d4df7e562cab394ac14829c3a1930ad18285a1c4f1b978f86f139e7a7ba8

  • SSDEEP

    196608:51MW16htZgggx4ocFRteuU8kdRz6cL5yCIU5mPH9linvOz:51MW161gggKouRtboz6cVyU5mv9gnvOz

Malware Config

Targets

    • Target

      2023-08-23_98a4e75b4a808235a046afdaa0f7bbcf_mafia_magniber_JC.exe

    • Size

      7.6MB

    • MD5

      98a4e75b4a808235a046afdaa0f7bbcf

    • SHA1

      aac097f65ec0b17bed7ec8aa5e59dd7287a16de9

    • SHA256

      715d8ad908ea887da74e93b1f1e9bd0a953e38a9573b11c94a3b3d786d87dcf1

    • SHA512

      453a559e6388acf582932ec186850f44650b8bb50ad15caa6b9eba585957b1cfb1d6d4df7e562cab394ac14829c3a1930ad18285a1c4f1b978f86f139e7a7ba8

    • SSDEEP

      196608:51MW16htZgggx4ocFRteuU8kdRz6cL5yCIU5mPH9linvOz:51MW161gggKouRtboz6cVyU5mv9gnvOz

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks