General

  • Target

    2024-04-22_a372cc3b40e5444cf30cf18086e26329_magniber

  • Size

    3.8MB

  • Sample

    240422-dbkn7aef55

  • MD5

    a372cc3b40e5444cf30cf18086e26329

  • SHA1

    5801b003420f6dcabf3e8ccbd91ae83736c9d9fe

  • SHA256

    87e6e962aef061c937e312706887ee5fa798358f751603d36b1da203b179a300

  • SHA512

    eabac344a1850a92a09a9a0538d01dace7a3f5c3672461dbec9bba6610920d01296607bd9cf58f244c7b337bf3145414c6dcd384ad46a52a371bc5f1fbf22b44

  • SSDEEP

    98304:Kzh1pjZmErOuPSDuzO0E0nE/jUt3M7H7qdk:KzhnsEquP56knJ3wH7qdk

Malware Config

Targets

    • Target

      2024-04-22_a372cc3b40e5444cf30cf18086e26329_magniber

    • Size

      3.8MB

    • MD5

      a372cc3b40e5444cf30cf18086e26329

    • SHA1

      5801b003420f6dcabf3e8ccbd91ae83736c9d9fe

    • SHA256

      87e6e962aef061c937e312706887ee5fa798358f751603d36b1da203b179a300

    • SHA512

      eabac344a1850a92a09a9a0538d01dace7a3f5c3672461dbec9bba6610920d01296607bd9cf58f244c7b337bf3145414c6dcd384ad46a52a371bc5f1fbf22b44

    • SSDEEP

      98304:Kzh1pjZmErOuPSDuzO0E0nE/jUt3M7H7qdk:KzhnsEquP56knJ3wH7qdk

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks