General

  • Target

    534b53ae5b4a8f35dcd967703bd5f6ecd17b50d847a81349f7abbc5505201311

  • Size

    2.2MB

  • Sample

    230914-xtv3esha39

  • MD5

    7cb26ce1ce8f2443233fbf3b40ec2486

  • SHA1

    199c2160aa9f82ad38c96a177b45e152b6d0d696

  • SHA256

    534b53ae5b4a8f35dcd967703bd5f6ecd17b50d847a81349f7abbc5505201311

  • SHA512

    0360551e5fa91546f05243f5dd71d008447eabe1fa8171085dac4bfe258c5172039ad45c78df7d919322cdc56e2557d4f3ce63c2a92108539ccc89896e539672

  • SSDEEP

    49152:HpbRm4GPK/MReGTEZ5C3f/yLxHAc3oVDn99c1/0VX4AhPAmZea+:J1GS/TC3SdAAuDnu0VXHhPAmZeR

Malware Config

Targets

    • Target

      534b53ae5b4a8f35dcd967703bd5f6ecd17b50d847a81349f7abbc5505201311

    • Size

      2.2MB

    • MD5

      7cb26ce1ce8f2443233fbf3b40ec2486

    • SHA1

      199c2160aa9f82ad38c96a177b45e152b6d0d696

    • SHA256

      534b53ae5b4a8f35dcd967703bd5f6ecd17b50d847a81349f7abbc5505201311

    • SHA512

      0360551e5fa91546f05243f5dd71d008447eabe1fa8171085dac4bfe258c5172039ad45c78df7d919322cdc56e2557d4f3ce63c2a92108539ccc89896e539672

    • SSDEEP

      49152:HpbRm4GPK/MReGTEZ5C3f/yLxHAc3oVDn99c1/0VX4AhPAmZea+:J1GS/TC3SdAAuDnu0VXHhPAmZeR

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Registers COM server for autorun

MITRE ATT&CK Enterprise v15

Tasks