General

  • Target

    fb0f80ce90e5f5bc1ae5a200abf49860a7d66a59f42e0a2255f531de41ff1920

  • Size

    2.4MB

  • Sample

    240827-zchrwazhpe

  • MD5

    808d042f57d34175ec1d43d140b61325

  • SHA1

    0cc56afe4082c28e97dd538864251da1f8c12fa1

  • SHA256

    fb0f80ce90e5f5bc1ae5a200abf49860a7d66a59f42e0a2255f531de41ff1920

  • SHA512

    08ec5f5a81a6984b824ff02f256eceb3bd448f247d2ead6ea840c9075caed8974475bed2e40c6730f98d23ea4bc1c62d5cdc2a499e1f03b1dfbcea71154e312a

  • SSDEEP

    49152:3nEwQW9vUTHQvy2ypHecGWFx0q5VWy7EeNlPtEEKQ0e50:3nEAecbypHecGW3PtQAnEEK1eG

Malware Config

Targets

    • Target

      fb0f80ce90e5f5bc1ae5a200abf49860a7d66a59f42e0a2255f531de41ff1920

    • Size

      2.4MB

    • MD5

      808d042f57d34175ec1d43d140b61325

    • SHA1

      0cc56afe4082c28e97dd538864251da1f8c12fa1

    • SHA256

      fb0f80ce90e5f5bc1ae5a200abf49860a7d66a59f42e0a2255f531de41ff1920

    • SHA512

      08ec5f5a81a6984b824ff02f256eceb3bd448f247d2ead6ea840c9075caed8974475bed2e40c6730f98d23ea4bc1c62d5cdc2a499e1f03b1dfbcea71154e312a

    • SSDEEP

      49152:3nEwQW9vUTHQvy2ypHecGWFx0q5VWy7EeNlPtEEKQ0e50:3nEAecbypHecGW3PtQAnEEK1eG

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks