General

  • Target

    2024-10-15_5d2b22cd6438af82a5bf464ce75189c7_magniber

  • Size

    3.0MB

  • Sample

    241015-crktfsygrf

  • MD5

    5d2b22cd6438af82a5bf464ce75189c7

  • SHA1

    a856c957ce1684c5b99feb414fa577d48eb7111c

  • SHA256

    e601a1f70c89f9cbdc7c4811d5c5505342f0c6a1f0dac78b136378893731abd6

  • SHA512

    5eee7497150175bded94d7a902269f140f2ab6d1b12f9ff24708653d46c3e08569b67807dea8d581a0887f8c3a8b8c211224fb6c79b2e83cbcb23ad61546c9c3

  • SSDEEP

    49152:TrI5cqsSfCTPMF2lPRXLv2tMyMpy72i4eyUiQTQy8VAJivu0Um1jhLRnjBok:TrI5U1KWXLyPWG25MTQy+AgRhLpe

Malware Config

Targets

    • Target

      2024-10-15_5d2b22cd6438af82a5bf464ce75189c7_magniber

    • Size

      3.0MB

    • MD5

      5d2b22cd6438af82a5bf464ce75189c7

    • SHA1

      a856c957ce1684c5b99feb414fa577d48eb7111c

    • SHA256

      e601a1f70c89f9cbdc7c4811d5c5505342f0c6a1f0dac78b136378893731abd6

    • SHA512

      5eee7497150175bded94d7a902269f140f2ab6d1b12f9ff24708653d46c3e08569b67807dea8d581a0887f8c3a8b8c211224fb6c79b2e83cbcb23ad61546c9c3

    • SSDEEP

      49152:TrI5cqsSfCTPMF2lPRXLv2tMyMpy72i4eyUiQTQy8VAJivu0Um1jhLRnjBok:TrI5U1KWXLyPWG25MTQy+AgRhLpe

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks