General

  • Target

    2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber

  • Size

    1.6MB

  • Sample

    240521-n7e4pada42

  • MD5

    ae32d366ad86f99e835acd3df6d1461f

  • SHA1

    611723159c451cf3ea51ea48d25554c0447c3771

  • SHA256

    386259862c77062a84fb58d2926fd4231320bc843b44f66137f675b87cb75608

  • SHA512

    c93dc6813b3d4c9b92efc5515faf086e368b3978cb3c6b795a305935251167791f65e813b00340efb4e6d85f38bd33182318acce2edd270c5005308727fd5f5c

  • SSDEEP

    49152:xRDcOmqU66IdwbhIOfTCAIpHv6TDxypBjHe:xRDcOmqUniyxh

Malware Config

Targets

    • Target

      2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber

    • Size

      1.6MB

    • MD5

      ae32d366ad86f99e835acd3df6d1461f

    • SHA1

      611723159c451cf3ea51ea48d25554c0447c3771

    • SHA256

      386259862c77062a84fb58d2926fd4231320bc843b44f66137f675b87cb75608

    • SHA512

      c93dc6813b3d4c9b92efc5515faf086e368b3978cb3c6b795a305935251167791f65e813b00340efb4e6d85f38bd33182318acce2edd270c5005308727fd5f5c

    • SSDEEP

      49152:xRDcOmqU66IdwbhIOfTCAIpHv6TDxypBjHe:xRDcOmqUniyxh

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks