General

  • Target

    494a3cac87aa6ce2b8024035209a1ed581820414048b345a749be450cf468f3e

  • Size

    2.3MB

  • Sample

    230914-xtxw1sha43

  • MD5

    752236eed39b3f7f2eea527e6a9f6fa4

  • SHA1

    ced1889bcacb52d129ef6cab66613a9c46baf525

  • SHA256

    494a3cac87aa6ce2b8024035209a1ed581820414048b345a749be450cf468f3e

  • SHA512

    6f7de5bf48b79f051222359cae88de4ba47fd59d011c7a83071a11a4c9904ab4d6015a7961fa473f77fcfe370605bf64d27a8c12a6fa686c9d86556b1282f05e

  • SSDEEP

    49152:AOENIVuFmTWrTrO8rZ2X7d8nI68B1ECYJgkF5HlWAmZea+:AOWI0Fm4OaZ2X7d8I68B+5JmAmZeR

Malware Config

Targets

    • Target

      494a3cac87aa6ce2b8024035209a1ed581820414048b345a749be450cf468f3e

    • Size

      2.3MB

    • MD5

      752236eed39b3f7f2eea527e6a9f6fa4

    • SHA1

      ced1889bcacb52d129ef6cab66613a9c46baf525

    • SHA256

      494a3cac87aa6ce2b8024035209a1ed581820414048b345a749be450cf468f3e

    • SHA512

      6f7de5bf48b79f051222359cae88de4ba47fd59d011c7a83071a11a4c9904ab4d6015a7961fa473f77fcfe370605bf64d27a8c12a6fa686c9d86556b1282f05e

    • SSDEEP

      49152:AOENIVuFmTWrTrO8rZ2X7d8nI68B1ECYJgkF5HlWAmZea+:AOWI0Fm4OaZ2X7d8I68B+5JmAmZeR

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks