General

  • Target

    2024-05-27_cbcca80166d7f0de8815212d2940aab4_magniber

  • Size

    2.7MB

  • Sample

    240527-takwkaae67

  • MD5

    cbcca80166d7f0de8815212d2940aab4

  • SHA1

    54b28025626a3fbfd64ed2eaef375d73869717fc

  • SHA256

    4299fe6876ed29f624f5cefe4159c71205ef326aedc186d895a5996a38abd755

  • SHA512

    6589c61f7a9872c52bcfa0c590c47ed977f063b6c3eff2cbc7e703a018265504972f018057c5b2587ee61f91163f0095d4aea9f569739741438e84c972ca75b6

  • SSDEEP

    49152:InaFBjo+YnzYTfnJpYmi40rcuZ5x4d2VC0o6Zj1pDfl8mLEHd4nDppLZt0F5oy8q:InaDjbYSnbUTZ5xXCf6ZTfREEpOFMQSs

Malware Config

Targets

    • Target

      2024-05-27_cbcca80166d7f0de8815212d2940aab4_magniber

    • Size

      2.7MB

    • MD5

      cbcca80166d7f0de8815212d2940aab4

    • SHA1

      54b28025626a3fbfd64ed2eaef375d73869717fc

    • SHA256

      4299fe6876ed29f624f5cefe4159c71205ef326aedc186d895a5996a38abd755

    • SHA512

      6589c61f7a9872c52bcfa0c590c47ed977f063b6c3eff2cbc7e703a018265504972f018057c5b2587ee61f91163f0095d4aea9f569739741438e84c972ca75b6

    • SSDEEP

      49152:InaFBjo+YnzYTfnJpYmi40rcuZ5x4d2VC0o6Zj1pDfl8mLEHd4nDppLZt0F5oy8q:InaDjbYSnbUTZ5xXCf6ZTfREEpOFMQSs

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks