General

  • Target

    64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f

  • Size

    2.4MB

  • Sample

    240804-dclymsydka

  • MD5

    f0fcd34f0b20e4ab5113e0820153589f

  • SHA1

    ed78c8645ac97fc72988b002a33d179ec3cdf09b

  • SHA256

    64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f

  • SHA512

    7d743736e21a62003ff1506e72bd6f46636cffc6236f66653cb990f9d5e774e420534c9e69beb97a457b7d819a4733581542f5111a7b84a91b96d0d5f275c733

  • SSDEEP

    49152:4cv0srYX2TOm4paX1shQPF0q5VWy7EeNDzkIiqdCpSCR9mIvFCtUKhF8:4cvRjCaX1shQdPtQAUIiqcpSCR4ItCiK

Malware Config

Targets

    • Target

      64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f

    • Size

      2.4MB

    • MD5

      f0fcd34f0b20e4ab5113e0820153589f

    • SHA1

      ed78c8645ac97fc72988b002a33d179ec3cdf09b

    • SHA256

      64c31a4c6ddca654976c551127bc2f81e9359df7809af6725db895d010b6e62f

    • SHA512

      7d743736e21a62003ff1506e72bd6f46636cffc6236f66653cb990f9d5e774e420534c9e69beb97a457b7d819a4733581542f5111a7b84a91b96d0d5f275c733

    • SSDEEP

      49152:4cv0srYX2TOm4paX1shQPF0q5VWy7EeNDzkIiqdCpSCR9mIvFCtUKhF8:4cvRjCaX1shQdPtQAUIiqcpSCR4ItCiK

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks