General

  • Target

    2024-01-18_d0ec439a0f98be4cd0c1d68823c53427_mafia

  • Size

    6.4MB

  • Sample

    240118-3dctssgea4

  • MD5

    d0ec439a0f98be4cd0c1d68823c53427

  • SHA1

    2112620e07a8622e1263ec7aa0d9f4d61da75da0

  • SHA256

    4c92603a0b9ce89a93c93734ec4efa90317fe02677235a17a25c7e9e90f575e2

  • SHA512

    8d84bb1b6ccc781713b06198805686e68cdbf6fd73e03c3c1887fec66a10edf3552502800a0f17450af78ca953beedf12c5dc8e5966798cda1004feaafec7ca9

  • SSDEEP

    196608:TIH4mtuGXhvu/fHTWNFZgyCIeqhcSzhfg4PwnX:TIH4mtuG1uXzWXyVKhcSzhI4InX

Malware Config

Targets

    • Target

      2024-01-18_d0ec439a0f98be4cd0c1d68823c53427_mafia

    • Size

      6.4MB

    • MD5

      d0ec439a0f98be4cd0c1d68823c53427

    • SHA1

      2112620e07a8622e1263ec7aa0d9f4d61da75da0

    • SHA256

      4c92603a0b9ce89a93c93734ec4efa90317fe02677235a17a25c7e9e90f575e2

    • SHA512

      8d84bb1b6ccc781713b06198805686e68cdbf6fd73e03c3c1887fec66a10edf3552502800a0f17450af78ca953beedf12c5dc8e5966798cda1004feaafec7ca9

    • SSDEEP

      196608:TIH4mtuGXhvu/fHTWNFZgyCIeqhcSzhfg4PwnX:TIH4mtuG1uXzWXyVKhcSzhI4InX

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks