General

  • Target

    2024-03-19_13ed7931fb86e52f8d145ccc9f1fa608_mafia_magniber

  • Size

    6.1MB

  • Sample

    240319-dx6hsaha2w

  • MD5

    13ed7931fb86e52f8d145ccc9f1fa608

  • SHA1

    a0a2a95b23154469aa0e8f01fbcec8678ab98fd2

  • SHA256

    629b1b8404f415cd624ecda37832cd09dad6a6b450ebcc6b11ce5fc69212585a

  • SHA512

    b82eaffb9c820923dcd94c97bec0ac3022914411f613924fcdb634de3bdaf56e9e246a4b60add481eaff0ab08dccfcc6fb07960516d16f7bb2af5a90ee6af58c

  • SSDEEP

    196608:r8GoNkZ0PnswSWt5M6SUO3je9FLOyomFHKnP:r8Go20nsbNe9F

Malware Config

Targets

    • Target

      2024-03-19_13ed7931fb86e52f8d145ccc9f1fa608_mafia_magniber

    • Size

      6.1MB

    • MD5

      13ed7931fb86e52f8d145ccc9f1fa608

    • SHA1

      a0a2a95b23154469aa0e8f01fbcec8678ab98fd2

    • SHA256

      629b1b8404f415cd624ecda37832cd09dad6a6b450ebcc6b11ce5fc69212585a

    • SHA512

      b82eaffb9c820923dcd94c97bec0ac3022914411f613924fcdb634de3bdaf56e9e246a4b60add481eaff0ab08dccfcc6fb07960516d16f7bb2af5a90ee6af58c

    • SSDEEP

      196608:r8GoNkZ0PnswSWt5M6SUO3je9FLOyomFHKnP:r8Go20nsbNe9F

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks