General

  • Target

    2024-10-19_d7910f09fa8fbaad2fb50ca38a22d2b7_hijackloader_mafia

  • Size

    2.0MB

  • Sample

    241019-b3qneayhmd

  • MD5

    d7910f09fa8fbaad2fb50ca38a22d2b7

  • SHA1

    8a68a3ba542d0fa581ee6e1554d06a331fa62f71

  • SHA256

    f4fa248d7a0db150875fc1334eacaedad0e58a02a311244ca7a7dd4882d14736

  • SHA512

    ffe4ce53e3be8eb8acebff57b83482c30c4f648a4a45fb7547abd009eda2e03d8a2e7ffaa9c47c61ec4bbe0f4ef782abcca2ae1b1fd4c0b0e1f229cbca6eaacb

  • SSDEEP

    49152:P7KjN8fXWTbVMHhzGwvJeXi30q5VWy7EeNpZy:P7KK68hzGyJeXaPtQAq

Malware Config

Targets

    • Target

      2024-10-19_d7910f09fa8fbaad2fb50ca38a22d2b7_hijackloader_mafia

    • Size

      2.0MB

    • MD5

      d7910f09fa8fbaad2fb50ca38a22d2b7

    • SHA1

      8a68a3ba542d0fa581ee6e1554d06a331fa62f71

    • SHA256

      f4fa248d7a0db150875fc1334eacaedad0e58a02a311244ca7a7dd4882d14736

    • SHA512

      ffe4ce53e3be8eb8acebff57b83482c30c4f648a4a45fb7547abd009eda2e03d8a2e7ffaa9c47c61ec4bbe0f4ef782abcca2ae1b1fd4c0b0e1f229cbca6eaacb

    • SSDEEP

      49152:P7KjN8fXWTbVMHhzGwvJeXi30q5VWy7EeNpZy:P7KK68hzGyJeXaPtQAq

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks