General

  • Target

    2024-04-23_f0737b7159fb109cfe67d27791c315cb_mafia

  • Size

    3.1MB

  • Sample

    240423-p6xg1sgd41

  • MD5

    f0737b7159fb109cfe67d27791c315cb

  • SHA1

    f2ad6a4d0f98f1df9940f3feac422477c212d767

  • SHA256

    b6b59461daad3d56109325e7b4f1eea6d496db7ae098e122274a613555783ca5

  • SHA512

    33828e6fdc1066721be99bf5556a8aa599efb259baacf15fe421b1e098cd71555c6e0edeff818485eaed919ae7ac4ba15716bb234c756c3d1b611bd4e83401c3

  • SSDEEP

    49152:3M5mP+GCxS0Ts70ASIippno68B1ECYJgkWom4txzZ15tU:3MYPpCe7VSIippo68B+5JVm0xltU

Malware Config

Targets

    • Target

      2024-04-23_f0737b7159fb109cfe67d27791c315cb_mafia

    • Size

      3.1MB

    • MD5

      f0737b7159fb109cfe67d27791c315cb

    • SHA1

      f2ad6a4d0f98f1df9940f3feac422477c212d767

    • SHA256

      b6b59461daad3d56109325e7b4f1eea6d496db7ae098e122274a613555783ca5

    • SHA512

      33828e6fdc1066721be99bf5556a8aa599efb259baacf15fe421b1e098cd71555c6e0edeff818485eaed919ae7ac4ba15716bb234c756c3d1b611bd4e83401c3

    • SSDEEP

      49152:3M5mP+GCxS0Ts70ASIippno68B1ECYJgkWom4txzZ15tU:3MYPpCe7VSIippo68B+5JVm0xltU

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks