General

  • Target

    34ed4517c2174a4a953f76ea36e8c5e9f5d1b0c10bbb181d40996cc74f079a7f

  • Size

    2.1MB

  • Sample

    231218-l5qfjabea9

  • MD5

    b53665cc30de7249ab924a29d2428df3

  • SHA1

    5ac53eca799f119e4cf7547fe3c948e0d67f29ff

  • SHA256

    34ed4517c2174a4a953f76ea36e8c5e9f5d1b0c10bbb181d40996cc74f079a7f

  • SHA512

    64e7131e6c10550231c3011653423abe8b477c81366117f4c7dc920f53bfe6508c981da82bd3328711bc4256023f2ac3f9d69a521c31c35df1b7661e605c9912

  • SSDEEP

    49152:HpbRm4GPK/MS2mTsgoLSwnBCcKt3oVDn99c1/0VXjZvhoj+:J1GS/KLNdK9uDnu0VXjlhT

Malware Config

Targets

    • Target

      34ed4517c2174a4a953f76ea36e8c5e9f5d1b0c10bbb181d40996cc74f079a7f

    • Size

      2.1MB

    • MD5

      b53665cc30de7249ab924a29d2428df3

    • SHA1

      5ac53eca799f119e4cf7547fe3c948e0d67f29ff

    • SHA256

      34ed4517c2174a4a953f76ea36e8c5e9f5d1b0c10bbb181d40996cc74f079a7f

    • SHA512

      64e7131e6c10550231c3011653423abe8b477c81366117f4c7dc920f53bfe6508c981da82bd3328711bc4256023f2ac3f9d69a521c31c35df1b7661e605c9912

    • SSDEEP

      49152:HpbRm4GPK/MS2mTsgoLSwnBCcKt3oVDn99c1/0VXjZvhoj+:J1GS/KLNdK9uDnu0VXjlhT

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Registers COM server for autorun

MITRE ATT&CK Enterprise v15

Tasks