General

  • Target

    2024-04-08_7d6e10c90cacdb9c1adc2bb6c9b7615d_mafia

  • Size

    2.2MB

  • Sample

    240408-b6z19adb5x

  • MD5

    7d6e10c90cacdb9c1adc2bb6c9b7615d

  • SHA1

    fc0a67ecb7fd4acbbb653d67fb5dddf9b0d94eac

  • SHA256

    e5b2519a881d8bb53352df1055483b2a0fef311b1c1d474875fffdd96cd2ab62

  • SHA512

    aded5749d9fe3f8b51821fbe807c6490fe20b29bc57c6117a5289df16e44e1978507c0a83d1a9ee72efaf9f4ffa3dfa1084cacbb9511e067a994ebfe46c120e3

  • SSDEEP

    49152:nQEqybdoJKqTdp9eTFGcOnmcxKJR3joQBhntttwQFxTEqatz:nQvGdm+T4REJRDBhn13pEqK

Malware Config

Targets

    • Target

      2024-04-08_7d6e10c90cacdb9c1adc2bb6c9b7615d_mafia

    • Size

      2.2MB

    • MD5

      7d6e10c90cacdb9c1adc2bb6c9b7615d

    • SHA1

      fc0a67ecb7fd4acbbb653d67fb5dddf9b0d94eac

    • SHA256

      e5b2519a881d8bb53352df1055483b2a0fef311b1c1d474875fffdd96cd2ab62

    • SHA512

      aded5749d9fe3f8b51821fbe807c6490fe20b29bc57c6117a5289df16e44e1978507c0a83d1a9ee72efaf9f4ffa3dfa1084cacbb9511e067a994ebfe46c120e3

    • SSDEEP

      49152:nQEqybdoJKqTdp9eTFGcOnmcxKJR3joQBhntttwQFxTEqatz:nQvGdm+T4REJRDBhn13pEqK

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks