General

  • Target

    2024-02-19_6c850ead2c8948bb6cf6bcfad01749a0_mafia

  • Size

    6.3MB

  • Sample

    240219-wl4h6aaf96

  • MD5

    6c850ead2c8948bb6cf6bcfad01749a0

  • SHA1

    448ad5835946e3e223e2aaf4ecdcc6fabd129ebb

  • SHA256

    7277aff9923bc160fc591dfb30ea8b3a8ef51c322cd9182c00713bd932753526

  • SHA512

    51376cf612ed38be4f3a3069bd46c7c0025139f808f77ae9c57c93fa8a415588126f6494cd44681647c60085e145d2a5e6b2a699fe931007e60fa66f0b6812b2

  • SSDEEP

    98304:9uoMZZfZg0uiLsfD+gFd8J/NfLSkTIoW5FPEpBR2QiQgtmT6J5DxltVfWQQpoQx/:9uoMHBue0dWVukTu5ntFtmTqZOQQUA

Malware Config

Targets

    • Target

      2024-02-19_6c850ead2c8948bb6cf6bcfad01749a0_mafia

    • Size

      6.3MB

    • MD5

      6c850ead2c8948bb6cf6bcfad01749a0

    • SHA1

      448ad5835946e3e223e2aaf4ecdcc6fabd129ebb

    • SHA256

      7277aff9923bc160fc591dfb30ea8b3a8ef51c322cd9182c00713bd932753526

    • SHA512

      51376cf612ed38be4f3a3069bd46c7c0025139f808f77ae9c57c93fa8a415588126f6494cd44681647c60085e145d2a5e6b2a699fe931007e60fa66f0b6812b2

    • SSDEEP

      98304:9uoMZZfZg0uiLsfD+gFd8J/NfLSkTIoW5FPEpBR2QiQgtmT6J5DxltVfWQQpoQx/:9uoMHBue0dWVukTu5ntFtmTqZOQQUA

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks