General
-
Target
2024-04-10_ecec8da81189e1aba1573f407b9ef3b1_mafia_magniber
-
Size
6.1MB
-
Sample
240410-elk85sgb8x
-
MD5
ecec8da81189e1aba1573f407b9ef3b1
-
SHA1
d77490f97d374306eb43b7bf2395cac791d358c0
-
SHA256
ce49f7e778a5890e41f91f6d4545dd8b4ceb0ce99af4b5694441e670ac7b7aba
-
SHA512
9c1547d827af970714863f6a45896fbec083f252fc370b55e9befbd935dd81fb592ead53cede4d716f50cd1666edcf21179b5b529cb81d5585eb4609f285b109
-
SSDEEP
196608:48GfreYpPnswIItnpon1NDgM5DFLOyomFHKnP:48GfSWnsadpuRF
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_ecec8da81189e1aba1573f407b9ef3b1_mafia_magniber.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-10_ecec8da81189e1aba1573f407b9ef3b1_mafia_magniber.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-10_ecec8da81189e1aba1573f407b9ef3b1_mafia_magniber
-
Size
6.1MB
-
MD5
ecec8da81189e1aba1573f407b9ef3b1
-
SHA1
d77490f97d374306eb43b7bf2395cac791d358c0
-
SHA256
ce49f7e778a5890e41f91f6d4545dd8b4ceb0ce99af4b5694441e670ac7b7aba
-
SHA512
9c1547d827af970714863f6a45896fbec083f252fc370b55e9befbd935dd81fb592ead53cede4d716f50cd1666edcf21179b5b529cb81d5585eb4609f285b109
-
SSDEEP
196608:48GfreYpPnswIItnpon1NDgM5DFLOyomFHKnP:48GfSWnsadpuRF
Score10/10-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-