General
-
Target
2024-05-18_bb59788bf9cbf41c274dc7727bf3ab71_mafia
-
Size
6.9MB
-
Sample
240518-lsgb4adh52
-
MD5
bb59788bf9cbf41c274dc7727bf3ab71
-
SHA1
1e59e75b8088d4ea3be582d4467e09fa4a809fd1
-
SHA256
2973484f217dff3fa75a6e9f7b125fd2233cfad0fecdc479118a818d5339de5e
-
SHA512
a72692fe61b15850467f952fb2e0742fb51325e758776ad7d2005ead907b726c48c3e1f7c4a6d98ee0d7254c6cd56af3db250b83a357d7bb5ca687c122ad82b3
-
SSDEEP
98304:F+e/bDDHKCdmeLAuzduCzr1uHX7nJbVuHMGTSYNlEqa3KXWhOQzNYDtcyDBf:F+OrHNmkztuLnJAH7SoUKXWbcGGx
Behavioral task
behavioral1
Sample
2024-05-18_bb59788bf9cbf41c274dc7727bf3ab71_mafia.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
2024-05-18_bb59788bf9cbf41c274dc7727bf3ab71_mafia
-
Size
6.9MB
-
MD5
bb59788bf9cbf41c274dc7727bf3ab71
-
SHA1
1e59e75b8088d4ea3be582d4467e09fa4a809fd1
-
SHA256
2973484f217dff3fa75a6e9f7b125fd2233cfad0fecdc479118a818d5339de5e
-
SHA512
a72692fe61b15850467f952fb2e0742fb51325e758776ad7d2005ead907b726c48c3e1f7c4a6d98ee0d7254c6cd56af3db250b83a357d7bb5ca687c122ad82b3
-
SSDEEP
98304:F+e/bDDHKCdmeLAuzduCzr1uHX7nJbVuHMGTSYNlEqa3KXWhOQzNYDtcyDBf:F+OrHNmkztuLnJAH7SoUKXWbcGGx
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Detects executables containing URLs to raw contents of a Github gist
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
UPX dump on OEP (original entry point)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-