General

  • Target

    6938783c7097cee4abe419f9344110ab2420bcdc266893c4bf268664ddb61d0f

  • Size

    5.7MB

  • Sample

    240819-agqkvashlc

  • MD5

    e794dedba25b3cb586a03f96e28dded1

  • SHA1

    af7fdb73cb182eb5953f61bb0abd7521eef5c0e7

  • SHA256

    6938783c7097cee4abe419f9344110ab2420bcdc266893c4bf268664ddb61d0f

  • SHA512

    12f4c5b48087b54e62c12996c39ad97795bede4a0a9e5ad7222dfd7206ed7d85c703b55104ef6a62008d787affb38ebf46d76e8fa5ff9ead09dfa06349a90177

  • SSDEEP

    98304:aYEVwE+0UXFKCr8m5xylsuAFV2WYQhM+1+u15ulWt7fbZzNTXaZLY52hJ97Mf:aYEVLCw6x/JV2MhMG+unusfsYA4

Malware Config

Targets

    • Target

      6938783c7097cee4abe419f9344110ab2420bcdc266893c4bf268664ddb61d0f

    • Size

      5.7MB

    • MD5

      e794dedba25b3cb586a03f96e28dded1

    • SHA1

      af7fdb73cb182eb5953f61bb0abd7521eef5c0e7

    • SHA256

      6938783c7097cee4abe419f9344110ab2420bcdc266893c4bf268664ddb61d0f

    • SHA512

      12f4c5b48087b54e62c12996c39ad97795bede4a0a9e5ad7222dfd7206ed7d85c703b55104ef6a62008d787affb38ebf46d76e8fa5ff9ead09dfa06349a90177

    • SSDEEP

      98304:aYEVwE+0UXFKCr8m5xylsuAFV2WYQhM+1+u15ulWt7fbZzNTXaZLY52hJ97Mf:aYEVLCw6x/JV2MhMG+unusfsYA4

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks