General

  • Target

    2024-02-23_67a511e02da5a44d5a71e3b73e889c47_magniber

  • Size

    4.5MB

  • Sample

    240223-c8phzaag49

  • MD5

    67a511e02da5a44d5a71e3b73e889c47

  • SHA1

    804c6f450059cf379f738fb37b4a02cb46bb2b43

  • SHA256

    42c3a733e37a6079a83f8ba4209d3558db203b3314dbc5d49fa30237a46a0b35

  • SHA512

    8da7312dc6cdd23ea567089c92d5ae648222d3c6d97f5c23e15bd6c2c5e55ff8eb1a64720c94bcdba8706dda0f2329b167e26bb53bdf2ab95749da5be9d06d01

  • SSDEEP

    98304:jB7HjhMuFrUsb2RBD+lb7a/FASL/qFTsSgEyH5qQg91r/4GyA2gyqY:jB7HK0NabFASLAfgEy0J9SLMyqY

Malware Config

Targets

    • Target

      2024-02-23_67a511e02da5a44d5a71e3b73e889c47_magniber

    • Size

      4.5MB

    • MD5

      67a511e02da5a44d5a71e3b73e889c47

    • SHA1

      804c6f450059cf379f738fb37b4a02cb46bb2b43

    • SHA256

      42c3a733e37a6079a83f8ba4209d3558db203b3314dbc5d49fa30237a46a0b35

    • SHA512

      8da7312dc6cdd23ea567089c92d5ae648222d3c6d97f5c23e15bd6c2c5e55ff8eb1a64720c94bcdba8706dda0f2329b167e26bb53bdf2ab95749da5be9d06d01

    • SSDEEP

      98304:jB7HjhMuFrUsb2RBD+lb7a/FASL/qFTsSgEyH5qQg91r/4GyA2gyqY:jB7HK0NabFASLAfgEy0J9SLMyqY

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks