General

  • Target

    2024-03-04_28e828c91372dd874833bd51c842bc92_mafia_magniber

  • Size

    8.3MB

  • Sample

    240304-kmgj8sfb69

  • MD5

    28e828c91372dd874833bd51c842bc92

  • SHA1

    1d6e8b0830efff00f740f7b197aa4cea961d0d14

  • SHA256

    51e2519b3e421f5158b45b8304bac9cf95c79d734062ccd2b014636d1ab3dfe9

  • SHA512

    58aa6265a7e7f5d13a061597d51c9dde92211b504c3804f20e0c4db9c6ad28fa63856fca696fdb22ae2f71b86af0b3b5020922fca04b61fab31f4d0a42b466c7

  • SSDEEP

    196608:qUBkRPBCOPgfQ54genHMhxCm8j3xDT95Eiq49pFLOyomFHKnP:qUBkRPB+Q54TMhxCXjlT9KitpF

Malware Config

Targets

    • Target

      2024-03-04_28e828c91372dd874833bd51c842bc92_mafia_magniber

    • Size

      8.3MB

    • MD5

      28e828c91372dd874833bd51c842bc92

    • SHA1

      1d6e8b0830efff00f740f7b197aa4cea961d0d14

    • SHA256

      51e2519b3e421f5158b45b8304bac9cf95c79d734062ccd2b014636d1ab3dfe9

    • SHA512

      58aa6265a7e7f5d13a061597d51c9dde92211b504c3804f20e0c4db9c6ad28fa63856fca696fdb22ae2f71b86af0b3b5020922fca04b61fab31f4d0a42b466c7

    • SSDEEP

      196608:qUBkRPBCOPgfQ54genHMhxCm8j3xDT95Eiq49pFLOyomFHKnP:qUBkRPB+Q54TMhxCXjlT9KitpF

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks