General

  • Target

    2024-04-24_a76fa31d7b99be1775e6a0341693b419_mafia_magniber

  • Size

    6.1MB

  • Sample

    240424-g6ggssfe5z

  • MD5

    a76fa31d7b99be1775e6a0341693b419

  • SHA1

    7ad96dd86bbce2af4f5258c21ec1f9839342fbe2

  • SHA256

    aee7c10b25d938dcf87f21c36fa2f63c8fb29e0183fb0aed45cedbab49d77914

  • SHA512

    2fef0476bca18a39bac34b9027f31d72ef4a9b14aec5935e122c88c3a4afceb64cdf1d1f2f2582368fcb92f504ee717f12bdc47cd68bda5befd9f69e7143fd29

  • SSDEEP

    196608:u8G2xC2wPnswg4odb6wM/UFLOyomFHKnP:u8G2kDnsb4o56ZUF

Malware Config

Targets

    • Target

      2024-04-24_a76fa31d7b99be1775e6a0341693b419_mafia_magniber

    • Size

      6.1MB

    • MD5

      a76fa31d7b99be1775e6a0341693b419

    • SHA1

      7ad96dd86bbce2af4f5258c21ec1f9839342fbe2

    • SHA256

      aee7c10b25d938dcf87f21c36fa2f63c8fb29e0183fb0aed45cedbab49d77914

    • SHA512

      2fef0476bca18a39bac34b9027f31d72ef4a9b14aec5935e122c88c3a4afceb64cdf1d1f2f2582368fcb92f504ee717f12bdc47cd68bda5befd9f69e7143fd29

    • SSDEEP

      196608:u8G2xC2wPnswg4odb6wM/UFLOyomFHKnP:u8G2kDnsb4o56ZUF

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks