General

  • Target

    16b267f69c3eb7f5d29f536f8b9820285250fd9e6f9479791f09e8e633ce2ad1

  • Size

    3.1MB

  • Sample

    240119-axfqksbahp

  • MD5

    5de4309dfcd38808ddba6f6859f9f360

  • SHA1

    cdc79ffb08e3e4e94f68f20bc1b02b1f6e9a3a7a

  • SHA256

    16b267f69c3eb7f5d29f536f8b9820285250fd9e6f9479791f09e8e633ce2ad1

  • SHA512

    9b205d8ff0b72f328c74c3a62cd6ce79e9d5cab4ad8be616a94e57c46ae75c38ecf8b07a0463c40f9aaf5fbd9633c55ad7de2f539e5d7572209741cb05285829

  • SSDEEP

    49152:p5+dm/qViwSPTXHCcpIEDLiq68B1ECYJgkxp3K4Um4txzZ15tU:p5t/uiVH/pIEDLp68B+5Jp3dUm0xltU

Malware Config

Targets

    • Target

      16b267f69c3eb7f5d29f536f8b9820285250fd9e6f9479791f09e8e633ce2ad1

    • Size

      3.1MB

    • MD5

      5de4309dfcd38808ddba6f6859f9f360

    • SHA1

      cdc79ffb08e3e4e94f68f20bc1b02b1f6e9a3a7a

    • SHA256

      16b267f69c3eb7f5d29f536f8b9820285250fd9e6f9479791f09e8e633ce2ad1

    • SHA512

      9b205d8ff0b72f328c74c3a62cd6ce79e9d5cab4ad8be616a94e57c46ae75c38ecf8b07a0463c40f9aaf5fbd9633c55ad7de2f539e5d7572209741cb05285829

    • SSDEEP

      49152:p5+dm/qViwSPTXHCcpIEDLiq68B1ECYJgkxp3K4Um4txzZ15tU:p5t/uiVH/pIEDLp68B+5Jp3dUm0xltU

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks