General

  • Target

    2024-05-09_347b36518d13cd02a1b31935757a2b53_mafia

  • Size

    3.1MB

  • Sample

    240509-nlx3dahg66

  • MD5

    347b36518d13cd02a1b31935757a2b53

  • SHA1

    4080457bc1382d3089222d0f07349d6d7eaf4195

  • SHA256

    15924de08b8e68e6bf0f42db7a7f90ca6a4ee7f49a0b1c84bcb700f04ad0c259

  • SHA512

    71c124dd61f5f2d41fb840f392dde13d4880020bc8bae8a95e1b96fbabc7f13bcf2c7d4e57977711cebbe632de4c530f6902ffc0f103e760fa1d6381c9141db1

  • SSDEEP

    49152:LM5mP+GC4S0Ts0k//p5Oz/968B1ECYJgkYe3m4txzZ15tU:LMYPpC10G/p5OzF68B+5Jee3m0xltU

Malware Config

Targets

    • Target

      2024-05-09_347b36518d13cd02a1b31935757a2b53_mafia

    • Size

      3.1MB

    • MD5

      347b36518d13cd02a1b31935757a2b53

    • SHA1

      4080457bc1382d3089222d0f07349d6d7eaf4195

    • SHA256

      15924de08b8e68e6bf0f42db7a7f90ca6a4ee7f49a0b1c84bcb700f04ad0c259

    • SHA512

      71c124dd61f5f2d41fb840f392dde13d4880020bc8bae8a95e1b96fbabc7f13bcf2c7d4e57977711cebbe632de4c530f6902ffc0f103e760fa1d6381c9141db1

    • SSDEEP

      49152:LM5mP+GC4S0Ts0k//p5Oz/968B1ECYJgkYe3m4txzZ15tU:LMYPpC10G/p5OzF68B+5Jee3m0xltU

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks