General

  • Target

    2024-05-08_4acc6ba77918686895c160d1c006009e_magniber

  • Size

    3.3MB

  • Sample

    240508-jkglsahh4z

  • MD5

    4acc6ba77918686895c160d1c006009e

  • SHA1

    99a0da7eb873008bd4bc8dc432cae70abce44d0f

  • SHA256

    218245e02f4bff4470cb7771d69fb2f30fbf90a442beeab6b45d87190ba98523

  • SHA512

    d44aa9f8c5ed7ffbf8fcbc1bd6c43ed4665dd9fa25e4aa25678ee23e7d59dc3794cde0ea8b0f94b250a63890464e40b7bf614845b292d5dea4bf8038c19d8525

  • SSDEEP

    49152:NYluUHuOXieTE9GJfrzAJ5m7qnjJA0f9LOsZ12G3WjaEj+bFr3z0L7:NYkUOO6WrejJL9L3T2G3Wj/iJre

Malware Config

Targets

    • Target

      2024-05-08_4acc6ba77918686895c160d1c006009e_magniber

    • Size

      3.3MB

    • MD5

      4acc6ba77918686895c160d1c006009e

    • SHA1

      99a0da7eb873008bd4bc8dc432cae70abce44d0f

    • SHA256

      218245e02f4bff4470cb7771d69fb2f30fbf90a442beeab6b45d87190ba98523

    • SHA512

      d44aa9f8c5ed7ffbf8fcbc1bd6c43ed4665dd9fa25e4aa25678ee23e7d59dc3794cde0ea8b0f94b250a63890464e40b7bf614845b292d5dea4bf8038c19d8525

    • SSDEEP

      49152:NYluUHuOXieTE9GJfrzAJ5m7qnjJA0f9LOsZ12G3WjaEj+bFr3z0L7:NYkUOO6WrejJL9L3T2G3Wj/iJre

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks