General

  • Target

    https://mahr.canto.global/s/SMEPL?viewIndex=0

  • Sample

    241010-lxrnmayfmj

Malware Config

Targets

    • Target

      https://mahr.canto.global/s/SMEPL?viewIndex=0

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks