General

  • Target

    2024-04-08_2e0787c914c2c99a9474563a0f83a03d_mafia_magniber

  • Size

    6.2MB

  • Sample

    240409-tmc2gsfc41

  • MD5

    2e0787c914c2c99a9474563a0f83a03d

  • SHA1

    5dfcfcbdb28555b7b9df5e1a681a1b7bac6c8e30

  • SHA256

    af0d3104f50e4fbbd95d187e1d025215b0b978205960e4f784863fd2ec67e968

  • SHA512

    5721e60372a8e44fca39851d218cab19ba1c4e035ad27f537e480b4f1a236b6c573b5829e0d31a8102df04dd8a507470d8b52ab856e2302d4597f70cac223b19

  • SSDEEP

    196608:0gW83+20SdqhRXJdd63sgJDNgCqaDj+xN+RdWyeNdbEc:0gv+21dERXdQfqaD6SRwNd5

Malware Config

Targets

    • Target

      2024-04-08_2e0787c914c2c99a9474563a0f83a03d_mafia_magniber

    • Size

      6.2MB

    • MD5

      2e0787c914c2c99a9474563a0f83a03d

    • SHA1

      5dfcfcbdb28555b7b9df5e1a681a1b7bac6c8e30

    • SHA256

      af0d3104f50e4fbbd95d187e1d025215b0b978205960e4f784863fd2ec67e968

    • SHA512

      5721e60372a8e44fca39851d218cab19ba1c4e035ad27f537e480b4f1a236b6c573b5829e0d31a8102df04dd8a507470d8b52ab856e2302d4597f70cac223b19

    • SSDEEP

      196608:0gW83+20SdqhRXJdd63sgJDNgCqaDj+xN+RdWyeNdbEc:0gv+21dERXdQfqaD6SRwNd5

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks