General

  • Target

    80cf65a80c75a5a31c280588d292888aebfe6a98a60a4a54d57b7f91562369ca

  • Size

    6.1MB

  • Sample

    241004-tr9k9ayare

  • MD5

    2a76bc075546653076bff642720a7d93

  • SHA1

    f84697fec682679b12291e8f00f47a92869e7a9a

  • SHA256

    80cf65a80c75a5a31c280588d292888aebfe6a98a60a4a54d57b7f91562369ca

  • SHA512

    156e5d65b66d23d0de617872c3ab1175c9be604c40be778e335e88b957d93ac7bbdfef2cdd55eae2a00cc926029298e53936f0612f4d8987ec90d0eaa29a38bd

  • SSDEEP

    98304:TQbRA+IWO7uVWuDnu0VXcEKQfsUpvzx+2pgmnxyt/m:MA+i69DfB1KQfLpvzgmnxO/m

Malware Config

Targets

    • Target

      80cf65a80c75a5a31c280588d292888aebfe6a98a60a4a54d57b7f91562369ca

    • Size

      6.1MB

    • MD5

      2a76bc075546653076bff642720a7d93

    • SHA1

      f84697fec682679b12291e8f00f47a92869e7a9a

    • SHA256

      80cf65a80c75a5a31c280588d292888aebfe6a98a60a4a54d57b7f91562369ca

    • SHA512

      156e5d65b66d23d0de617872c3ab1175c9be604c40be778e335e88b957d93ac7bbdfef2cdd55eae2a00cc926029298e53936f0612f4d8987ec90d0eaa29a38bd

    • SSDEEP

      98304:TQbRA+IWO7uVWuDnu0VXcEKQfsUpvzx+2pgmnxyt/m:MA+i69DfB1KQfLpvzgmnxO/m

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks