General

  • Target

    2024-05-01_b5d51207a0c0be625058270de75c3a78_mafia_magniber

  • Size

    6.1MB

  • Sample

    240501-pxgefahb56

  • MD5

    b5d51207a0c0be625058270de75c3a78

  • SHA1

    ec467ed52b5c9fb5c81d945c0325f2b8177fda61

  • SHA256

    b17593a12f288906e10b04c85eb3afa003748e48ed8b121814c2d49017ca93f6

  • SHA512

    73008a23ad7f8a63b8b0f064aab4fbb8983bcc631ac35ee5b0ee013936475c8e0559af7e0fb728ce0429645aab72b2a104bbbae2f7ddcdc3cc8849a778542609

  • SSDEEP

    98304:S8GuXmm8wbOzdExHSzRmz1bOL+PnXcwxYh59dCUPqP13zrFLOAkGkzdnEVomFHKP:S8GOxbOkPnswKh5yXPVFLOyomFHKnP

Malware Config

Targets

    • Target

      2024-05-01_b5d51207a0c0be625058270de75c3a78_mafia_magniber

    • Size

      6.1MB

    • MD5

      b5d51207a0c0be625058270de75c3a78

    • SHA1

      ec467ed52b5c9fb5c81d945c0325f2b8177fda61

    • SHA256

      b17593a12f288906e10b04c85eb3afa003748e48ed8b121814c2d49017ca93f6

    • SHA512

      73008a23ad7f8a63b8b0f064aab4fbb8983bcc631ac35ee5b0ee013936475c8e0559af7e0fb728ce0429645aab72b2a104bbbae2f7ddcdc3cc8849a778542609

    • SSDEEP

      98304:S8GuXmm8wbOzdExHSzRmz1bOL+PnXcwxYh59dCUPqP13zrFLOAkGkzdnEVomFHKP:S8GOxbOkPnswKh5yXPVFLOyomFHKnP

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks