General

  • Target

    2024-05-18_bb59788bf9cbf41c274dc7727bf3ab71_mafia

  • Size

    6.9MB

  • Sample

    240518-lsgb4adh52

  • MD5

    bb59788bf9cbf41c274dc7727bf3ab71

  • SHA1

    1e59e75b8088d4ea3be582d4467e09fa4a809fd1

  • SHA256

    2973484f217dff3fa75a6e9f7b125fd2233cfad0fecdc479118a818d5339de5e

  • SHA512

    a72692fe61b15850467f952fb2e0742fb51325e758776ad7d2005ead907b726c48c3e1f7c4a6d98ee0d7254c6cd56af3db250b83a357d7bb5ca687c122ad82b3

  • SSDEEP

    98304:F+e/bDDHKCdmeLAuzduCzr1uHX7nJbVuHMGTSYNlEqa3KXWhOQzNYDtcyDBf:F+OrHNmkztuLnJAH7SoUKXWbcGGx

Malware Config

Targets

    • Target

      2024-05-18_bb59788bf9cbf41c274dc7727bf3ab71_mafia

    • Size

      6.9MB

    • MD5

      bb59788bf9cbf41c274dc7727bf3ab71

    • SHA1

      1e59e75b8088d4ea3be582d4467e09fa4a809fd1

    • SHA256

      2973484f217dff3fa75a6e9f7b125fd2233cfad0fecdc479118a818d5339de5e

    • SHA512

      a72692fe61b15850467f952fb2e0742fb51325e758776ad7d2005ead907b726c48c3e1f7c4a6d98ee0d7254c6cd56af3db250b83a357d7bb5ca687c122ad82b3

    • SSDEEP

      98304:F+e/bDDHKCdmeLAuzduCzr1uHX7nJbVuHMGTSYNlEqa3KXWhOQzNYDtcyDBf:F+OrHNmkztuLnJAH7SoUKXWbcGGx

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Detects executables containing URLs to raw contents of a Github gist

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • UPX dump on OEP (original entry point)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks