General

  • Target

    2024-04-09_ea4ef1d593e5f674c502d4ec6b24a08a_mafia

  • Size

    2.0MB

  • Sample

    240409-t8t7wscf68

  • MD5

    ea4ef1d593e5f674c502d4ec6b24a08a

  • SHA1

    c07234674de4b812ab74350254bdb339c419c726

  • SHA256

    e8d19e6b9b7b3beb3aa2e01c7ef9cfbd9d369940b1e1a7d4eb8243885363b341

  • SHA512

    a058a7e1c4b8e2c13157ac02f0f3da5ec9a84db575e223a7c5fe5d969ba0f570418d45e523cbcfa8f7d144ce19cd45aa856d5830b11a5457fbbb4c71fd4fa6e6

  • SSDEEP

    49152:ptYugss2KqgT+oBxdsp4xwTHsEiR3joQBTrCfu:ptzrsssdErHiRDBTrCfu

Malware Config

Targets

    • Target

      2024-04-09_ea4ef1d593e5f674c502d4ec6b24a08a_mafia

    • Size

      2.0MB

    • MD5

      ea4ef1d593e5f674c502d4ec6b24a08a

    • SHA1

      c07234674de4b812ab74350254bdb339c419c726

    • SHA256

      e8d19e6b9b7b3beb3aa2e01c7ef9cfbd9d369940b1e1a7d4eb8243885363b341

    • SHA512

      a058a7e1c4b8e2c13157ac02f0f3da5ec9a84db575e223a7c5fe5d969ba0f570418d45e523cbcfa8f7d144ce19cd45aa856d5830b11a5457fbbb4c71fd4fa6e6

    • SSDEEP

      49152:ptYugss2KqgT+oBxdsp4xwTHsEiR3joQBTrCfu:ptzrsssdErHiRDBTrCfu

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks