General

  • Target

    2024-03-31_98b328dcd64d434edd94146a2054c214_mafia

  • Size

    3.1MB

  • Sample

    240331-tgbapsfa47

  • MD5

    98b328dcd64d434edd94146a2054c214

  • SHA1

    b25edb9ed5ab294ca28bbb1b328f336218e20c33

  • SHA256

    ac25dfda293f83e31556872bb8f4b5697b0b18396244175fd4f0321209b05f04

  • SHA512

    06400c37472c993b65864f09c0c9b167d18b5014c06c76d2a4c9f0accc463ffa02208d1e65951c1e052be5e5ae04dae32bd4f9755515e97166503bf075a83d38

  • SSDEEP

    49152:xM5mP+GCdS0TsHTewBqTvv68B1ECYJgkR4lZt5m4txzZ15tU:xMYPpCKHKwBqTvv68B+5J+m0xltU

Malware Config

Targets

    • Target

      2024-03-31_98b328dcd64d434edd94146a2054c214_mafia

    • Size

      3.1MB

    • MD5

      98b328dcd64d434edd94146a2054c214

    • SHA1

      b25edb9ed5ab294ca28bbb1b328f336218e20c33

    • SHA256

      ac25dfda293f83e31556872bb8f4b5697b0b18396244175fd4f0321209b05f04

    • SHA512

      06400c37472c993b65864f09c0c9b167d18b5014c06c76d2a4c9f0accc463ffa02208d1e65951c1e052be5e5ae04dae32bd4f9755515e97166503bf075a83d38

    • SSDEEP

      49152:xM5mP+GCdS0TsHTewBqTvv68B1ECYJgkR4lZt5m4txzZ15tU:xMYPpCKHKwBqTvv68B+5J+m0xltU

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks