General

  • Target

    86f5a08e2ff359cd8c64b8ebd5e0b25a22afdf6d17b74bd0aeffff598e876b96N

  • Size

    3.0MB

  • Sample

    240919-lvc3fsscmb

  • MD5

    241795bf38c027797baf3acc1191d490

  • SHA1

    6bfeda1bca630c32d720d151d8aed891519e1b1b

  • SHA256

    86f5a08e2ff359cd8c64b8ebd5e0b25a22afdf6d17b74bd0aeffff598e876b96

  • SHA512

    a2e462dd6d9e9c3114db5a661405a5ed952705090ebc8d55aeb69e442ff0f3bf776234268e044c20334ebb68e966e806636b56878a0c21abae71df2e9fcdc92c

  • SSDEEP

    49152:vryDFQDfCT3pYSaogHtMyMpy7RYf1TW+dIO8NtAJm2+H24f1zcM6vSsrQO:vryGipaooPWGCfhW+mOmAMRHZ1nssO

Malware Config

Targets

    • Target

      86f5a08e2ff359cd8c64b8ebd5e0b25a22afdf6d17b74bd0aeffff598e876b96N

    • Size

      3.0MB

    • MD5

      241795bf38c027797baf3acc1191d490

    • SHA1

      6bfeda1bca630c32d720d151d8aed891519e1b1b

    • SHA256

      86f5a08e2ff359cd8c64b8ebd5e0b25a22afdf6d17b74bd0aeffff598e876b96

    • SHA512

      a2e462dd6d9e9c3114db5a661405a5ed952705090ebc8d55aeb69e442ff0f3bf776234268e044c20334ebb68e966e806636b56878a0c21abae71df2e9fcdc92c

    • SSDEEP

      49152:vryDFQDfCT3pYSaogHtMyMpy7RYf1TW+dIO8NtAJm2+H24f1zcM6vSsrQO:vryGipaooPWGCfhW+mOmAMRHZ1nssO

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks