General

  • Target

    34614d74c87dd35699a46b00c6bab995dc95efa1035704415e4affb4eba38949

  • Size

    9.5MB

  • Sample

    240519-hmygmsfb9x

  • MD5

    6bbfea1a0d783a09f481f15ec81f54f5

  • SHA1

    348b7a3cd4c9ccd21f7d435344922861fb25a150

  • SHA256

    34614d74c87dd35699a46b00c6bab995dc95efa1035704415e4affb4eba38949

  • SHA512

    e6a744d1646048a13286e99519936ad81f5ea1bfc5124050e9d74b346fbe22410a75d391f9c9f1ed7f76206d56ad9fac6c210a0c9d2f5fa4f5405f1deda324c7

  • SSDEEP

    196608:nF+DGhrXoxPHrz4RLfqqhqDF6xIlg6fjphjbtAwbBvuiM:nF+DGhrXoxPHrMRLfqqoDFpln7rbt

Malware Config

Targets

    • Target

      34614d74c87dd35699a46b00c6bab995dc95efa1035704415e4affb4eba38949

    • Size

      9.5MB

    • MD5

      6bbfea1a0d783a09f481f15ec81f54f5

    • SHA1

      348b7a3cd4c9ccd21f7d435344922861fb25a150

    • SHA256

      34614d74c87dd35699a46b00c6bab995dc95efa1035704415e4affb4eba38949

    • SHA512

      e6a744d1646048a13286e99519936ad81f5ea1bfc5124050e9d74b346fbe22410a75d391f9c9f1ed7f76206d56ad9fac6c210a0c9d2f5fa4f5405f1deda324c7

    • SSDEEP

      196608:nF+DGhrXoxPHrz4RLfqqhqDF6xIlg6fjphjbtAwbBvuiM:nF+DGhrXoxPHrMRLfqqoDFpln7rbt

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks