General

  • Target

    a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c

  • Size

    6.1MB

  • Sample

    240810-r9zsnaycjd

  • MD5

    83ebf73dd3ae56cd3f80e15220f761f3

  • SHA1

    3b6a69b0c1b4ddc916323e4c3fd93f0c59736d54

  • SHA256

    a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c

  • SHA512

    0a51c195d59444bdb5caf90a95f6fbdc690c5ed8acdce830cff3836a53c145bf71582dd7fdea5fad1fe1412075e241e62aba17d7b544e61492a3d67d78ec4ea9

  • SSDEEP

    98304:LP02A+gsksQuDnu0VXdK3JitsiLTAMxWtlm:/A+xDfBdK36scTAMxClm

Malware Config

Targets

    • Target

      a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c

    • Size

      6.1MB

    • MD5

      83ebf73dd3ae56cd3f80e15220f761f3

    • SHA1

      3b6a69b0c1b4ddc916323e4c3fd93f0c59736d54

    • SHA256

      a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c

    • SHA512

      0a51c195d59444bdb5caf90a95f6fbdc690c5ed8acdce830cff3836a53c145bf71582dd7fdea5fad1fe1412075e241e62aba17d7b544e61492a3d67d78ec4ea9

    • SSDEEP

      98304:LP02A+gsksQuDnu0VXdK3JitsiLTAMxWtlm:/A+xDfBdK36scTAMxClm

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks