General
-
Target
2024-09-20_aaa74715d5f3f0b8745b66f8b2ed1ef3_mafia
-
Size
8.3MB
-
Sample
240920-a6l9qazeme
-
MD5
aaa74715d5f3f0b8745b66f8b2ed1ef3
-
SHA1
45bb4f63e5428098c69f623fce0830e959ca3f65
-
SHA256
1e7d59c869e27073d03898b7ded8c597b55a2791c36af2ae29d8593751c72687
-
SHA512
3a5b730aabcf410edae7ee8926d3af5b076925c70ed0ec5ac8f8d2847ddce72cee42080849aba7e747a1a4ff3e0fc3c9c83f955fb3b50678ac45b7d976482eab
-
SSDEEP
196608:ZLweeSIYd2Qv8eqkhBZ1AcZ3D++Q00OISC5EvMyxQdATpKI:ZLwefBx5tjA0C5G9xQ8K
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-20_aaa74715d5f3f0b8745b66f8b2ed1ef3_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-09-20_aaa74715d5f3f0b8745b66f8b2ed1ef3_mafia
-
Size
8.3MB
-
MD5
aaa74715d5f3f0b8745b66f8b2ed1ef3
-
SHA1
45bb4f63e5428098c69f623fce0830e959ca3f65
-
SHA256
1e7d59c869e27073d03898b7ded8c597b55a2791c36af2ae29d8593751c72687
-
SHA512
3a5b730aabcf410edae7ee8926d3af5b076925c70ed0ec5ac8f8d2847ddce72cee42080849aba7e747a1a4ff3e0fc3c9c83f955fb3b50678ac45b7d976482eab
-
SSDEEP
196608:ZLweeSIYd2Qv8eqkhBZ1AcZ3D++Q00OISC5EvMyxQdATpKI:ZLwefBx5tjA0C5G9xQ8K
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-