General

  • Target

    84077d0d389983e7dc332740ccbade19

  • Size

    4.9MB

  • Sample

    240409-2wj56abf6t

  • MD5

    84077d0d389983e7dc332740ccbade19

  • SHA1

    51e54abab6878b1c14a71557a2c48152b829df8c

  • SHA256

    7c620843361c577c94297f4a16eba109328dd8880b776b6764baeb2d898865a4

  • SHA512

    3620a43ac1b287aaf65ce0c8f06f594f70adf1f9791c4ffc7df4631611accff9f58dc6e9777ee7729874db5a895bc26632bf21fdb264cc24346fc23f04333543

  • SSDEEP

    98304:GS5I0l9dF0PWG/tPfX8i3hmwIAbhSO9qBS6g1lu:GS5j9mPB/VX8MmzA9RsSx

Malware Config

Targets

    • Target

      84077d0d389983e7dc332740ccbade19

    • Size

      4.9MB

    • MD5

      84077d0d389983e7dc332740ccbade19

    • SHA1

      51e54abab6878b1c14a71557a2c48152b829df8c

    • SHA256

      7c620843361c577c94297f4a16eba109328dd8880b776b6764baeb2d898865a4

    • SHA512

      3620a43ac1b287aaf65ce0c8f06f594f70adf1f9791c4ffc7df4631611accff9f58dc6e9777ee7729874db5a895bc26632bf21fdb264cc24346fc23f04333543

    • SSDEEP

      98304:GS5I0l9dF0PWG/tPfX8i3hmwIAbhSO9qBS6g1lu:GS5j9mPB/VX8MmzA9RsSx

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks