General

  • Target

    2024-03-18_78acb3b7c9354ccf719d0ae713ef08e3_mafia_magniber

  • Size

    6.1MB

  • Sample

    240318-t34t5sdg7v

  • MD5

    78acb3b7c9354ccf719d0ae713ef08e3

  • SHA1

    c2b24919fe151b9e2f717e6767493874305d3853

  • SHA256

    63e7829ba5553ee0d861e20051408bd541b0de18ab5c69f00def35f7e56049b7

  • SHA512

    79bcb0bc79473fc659f46fa0d199d9eed5ed574186785c7e82906e367e43e3ac820ad73b9d07d111546c4551e1ea1be3e36bac1a8da7637bdc2fe8e01785fac5

  • SSDEEP

    98304:B8GujOgW+vPhqeVHSzRmz1bOL+PnXcwdauoUnIlwsxs4D4eFLOAkGkzdnEVomFHo:B8GchvPbPnswXolw4seFLOyomFHKnP

Malware Config

Targets

    • Target

      2024-03-18_78acb3b7c9354ccf719d0ae713ef08e3_mafia_magniber

    • Size

      6.1MB

    • MD5

      78acb3b7c9354ccf719d0ae713ef08e3

    • SHA1

      c2b24919fe151b9e2f717e6767493874305d3853

    • SHA256

      63e7829ba5553ee0d861e20051408bd541b0de18ab5c69f00def35f7e56049b7

    • SHA512

      79bcb0bc79473fc659f46fa0d199d9eed5ed574186785c7e82906e367e43e3ac820ad73b9d07d111546c4551e1ea1be3e36bac1a8da7637bdc2fe8e01785fac5

    • SSDEEP

      98304:B8GujOgW+vPhqeVHSzRmz1bOL+PnXcwdauoUnIlwsxs4D4eFLOAkGkzdnEVomFHo:B8GchvPbPnswXolw4seFLOyomFHKnP

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks