General
-
Target
2024-10-15_5d2b22cd6438af82a5bf464ce75189c7_magniber
-
Size
3.0MB
-
Sample
241015-crktfsygrf
-
MD5
5d2b22cd6438af82a5bf464ce75189c7
-
SHA1
a856c957ce1684c5b99feb414fa577d48eb7111c
-
SHA256
e601a1f70c89f9cbdc7c4811d5c5505342f0c6a1f0dac78b136378893731abd6
-
SHA512
5eee7497150175bded94d7a902269f140f2ab6d1b12f9ff24708653d46c3e08569b67807dea8d581a0887f8c3a8b8c211224fb6c79b2e83cbcb23ad61546c9c3
-
SSDEEP
49152:TrI5cqsSfCTPMF2lPRXLv2tMyMpy72i4eyUiQTQy8VAJivu0Um1jhLRnjBok:TrI5U1KWXLyPWG25MTQy+AgRhLpe
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-15_5d2b22cd6438af82a5bf464ce75189c7_magniber.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-10-15_5d2b22cd6438af82a5bf464ce75189c7_magniber
-
Size
3.0MB
-
MD5
5d2b22cd6438af82a5bf464ce75189c7
-
SHA1
a856c957ce1684c5b99feb414fa577d48eb7111c
-
SHA256
e601a1f70c89f9cbdc7c4811d5c5505342f0c6a1f0dac78b136378893731abd6
-
SHA512
5eee7497150175bded94d7a902269f140f2ab6d1b12f9ff24708653d46c3e08569b67807dea8d581a0887f8c3a8b8c211224fb6c79b2e83cbcb23ad61546c9c3
-
SSDEEP
49152:TrI5cqsSfCTPMF2lPRXLv2tMyMpy72i4eyUiQTQy8VAJivu0Um1jhLRnjBok:TrI5U1KWXLyPWG25MTQy+AgRhLpe
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-