General

  • Target

    2024-04-16_672605ab8056f4342cb44f5f47cbb4cb_magniber

  • Size

    23.2MB

  • Sample

    240416-sffclada39

  • MD5

    672605ab8056f4342cb44f5f47cbb4cb

  • SHA1

    1ed8c56100565159e83ce8f7d903d29a1b287050

  • SHA256

    ff0d55b77411509c652cad267493a690d62d856602d348181cf1f1bdaf877c26

  • SHA512

    4d482de9229cb18abcd31827b5a7a02ea493e6d9121c30a87292fa6b1e7bb566ad7335d6105b7590a1a54db21391b00037ec7348fa38e77041257d00dd493d5e

  • SSDEEP

    393216:3FgboA6zuuVOXtl1RFStx6lHWw8CkNYVBYsOBnZKd722rGIeR:m8uLtYmHuNYVBYtnZKBDYR

Malware Config

Targets

    • Target

      2024-04-16_672605ab8056f4342cb44f5f47cbb4cb_magniber

    • Size

      23.2MB

    • MD5

      672605ab8056f4342cb44f5f47cbb4cb

    • SHA1

      1ed8c56100565159e83ce8f7d903d29a1b287050

    • SHA256

      ff0d55b77411509c652cad267493a690d62d856602d348181cf1f1bdaf877c26

    • SHA512

      4d482de9229cb18abcd31827b5a7a02ea493e6d9121c30a87292fa6b1e7bb566ad7335d6105b7590a1a54db21391b00037ec7348fa38e77041257d00dd493d5e

    • SSDEEP

      393216:3FgboA6zuuVOXtl1RFStx6lHWw8CkNYVBYsOBnZKd722rGIeR:m8uLtYmHuNYVBYtnZKBDYR

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks