General

  • Target

    2024-02-03_a41d5020ad32efa8127d02724ea2494d_magniber

  • Size

    3.1MB

  • Sample

    240203-ljpbcagfcn

  • MD5

    a41d5020ad32efa8127d02724ea2494d

  • SHA1

    5608ff4e5a5238dcfe78a4e9beaf9ca6ce0259c3

  • SHA256

    62b6c650ded1f9a6a3fb788cd07e573ae02d56caaeeedf2561dde407edf8a4e5

  • SHA512

    a2f9d7a7e3ddd8078a2ae0f75c97539e7be8cb22fd2eaa617a16536515e95bcc54ba71ba9451a5047b0b253ae1a8c5afda968b092a62d10cacb8ed7e6ec06c01

  • SSDEEP

    49152:x1aOm5VfTTym1VwVxvxBdUb0q5VWy7EeNJ72/1ktAnFfSZbYi7y:x1aLRmVxvxBdUbPtQAJi/vnFqZny

Malware Config

Targets

    • Target

      2024-02-03_a41d5020ad32efa8127d02724ea2494d_magniber

    • Size

      3.1MB

    • MD5

      a41d5020ad32efa8127d02724ea2494d

    • SHA1

      5608ff4e5a5238dcfe78a4e9beaf9ca6ce0259c3

    • SHA256

      62b6c650ded1f9a6a3fb788cd07e573ae02d56caaeeedf2561dde407edf8a4e5

    • SHA512

      a2f9d7a7e3ddd8078a2ae0f75c97539e7be8cb22fd2eaa617a16536515e95bcc54ba71ba9451a5047b0b253ae1a8c5afda968b092a62d10cacb8ed7e6ec06c01

    • SSDEEP

      49152:x1aOm5VfTTym1VwVxvxBdUb0q5VWy7EeNJ72/1ktAnFfSZbYi7y:x1aLRmVxvxBdUbPtQAJi/vnFqZny

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks