General

  • Target

    2a6b054c3052544003da8ab20ea92cdb523f9785d76c7590d5d8707f2e259617

  • Size

    2.3MB

  • Sample

    231116-m3bp2aag77

  • MD5

    fa003936193d44f064e0f207afa24cac

  • SHA1

    cdb5ab3b13d11539e01a4f2dadcc2ca6fcb8d534

  • SHA256

    2a6b054c3052544003da8ab20ea92cdb523f9785d76c7590d5d8707f2e259617

  • SHA512

    30bd4c66733ec1ac455292e78f55c404c8a9f53d96a8bd4022abbcb3d4469dd813e6fd663b9111c9167151309a66ae38a2b45527906d38aca5eca90d282346c4

  • SSDEEP

    49152:YOENIVuFmrWrTrddBLlWP7Tq68B1ECYJgkbft9AmZea+:YOWI0FmAdrLlWP7268B+5J9XAmZeR

Malware Config

Targets

    • Target

      2a6b054c3052544003da8ab20ea92cdb523f9785d76c7590d5d8707f2e259617

    • Size

      2.3MB

    • MD5

      fa003936193d44f064e0f207afa24cac

    • SHA1

      cdb5ab3b13d11539e01a4f2dadcc2ca6fcb8d534

    • SHA256

      2a6b054c3052544003da8ab20ea92cdb523f9785d76c7590d5d8707f2e259617

    • SHA512

      30bd4c66733ec1ac455292e78f55c404c8a9f53d96a8bd4022abbcb3d4469dd813e6fd663b9111c9167151309a66ae38a2b45527906d38aca5eca90d282346c4

    • SSDEEP

      49152:YOENIVuFmrWrTrddBLlWP7Tq68B1ECYJgkbft9AmZea+:YOWI0FmAdrLlWP7268B+5J9XAmZeR

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks