General

  • Target

    2024-05-23_fc11bbe60a006ebef9ea994aae3a27cb_mafia_magniber

  • Size

    6.1MB

  • Sample

    240523-dbkzysbd83

  • MD5

    fc11bbe60a006ebef9ea994aae3a27cb

  • SHA1

    7ee18f091c19f94e798241b70160110d3a9cf81e

  • SHA256

    f58301d4b5115342f2c3ef5a7f000c2784cdb2d7a006198d1f86b40a87f86ef2

  • SHA512

    bfcac503161d5e23ab4169a8c04a5b3007bbae9611ab71a5566982f6ba0773902131ba5aabed73659dffeaeefba9dcfdc2c088ffd3a530be84d0c9108b3745e6

  • SSDEEP

    98304:J8Gui09qagcP5HSzRmz1bOL+PnXcw+wqNZ1Fyu6TI1DTAFSgjFLOAkGkzdnEVom2:J8GwqavPnsw1sZNtDIFLOyomFHKnP

Malware Config

Targets

    • Target

      2024-05-23_fc11bbe60a006ebef9ea994aae3a27cb_mafia_magniber

    • Size

      6.1MB

    • MD5

      fc11bbe60a006ebef9ea994aae3a27cb

    • SHA1

      7ee18f091c19f94e798241b70160110d3a9cf81e

    • SHA256

      f58301d4b5115342f2c3ef5a7f000c2784cdb2d7a006198d1f86b40a87f86ef2

    • SHA512

      bfcac503161d5e23ab4169a8c04a5b3007bbae9611ab71a5566982f6ba0773902131ba5aabed73659dffeaeefba9dcfdc2c088ffd3a530be84d0c9108b3745e6

    • SSDEEP

      98304:J8Gui09qagcP5HSzRmz1bOL+PnXcw+wqNZ1Fyu6TI1DTAFSgjFLOAkGkzdnEVom2:J8GwqavPnsw1sZNtDIFLOyomFHKnP

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks