General

  • Target

    RPGXP_E.exe

  • Size

    27.2MB

  • Sample

    241102-vq21fszmay

  • MD5

    4db4691a4f71af97b109b11ee2c70ec9

  • SHA1

    ba5eaa22936505df35a10319dbce60ed6e873383

  • SHA256

    7f0005d39580ba537d4f9581b47c28adf132a6586d62881a62cd56fa1b24ab27

  • SHA512

    2688575f993dd7c2b0bff1634465149103412032bc882d09ccd492033ec94b27c84e4a1655118264728fea358969504ff748a8e6fe73dd313789f2a2d142f15a

  • SSDEEP

    786432:F6HKbIBBYy9IMhfpNIubCq9iS2wvX1RA6rxiShm0RML1P:+iI3/9IM6uejAX1RUShT

Malware Config

Targets

    • Target

      RPGXP_E.exe

    • Size

      27.2MB

    • MD5

      4db4691a4f71af97b109b11ee2c70ec9

    • SHA1

      ba5eaa22936505df35a10319dbce60ed6e873383

    • SHA256

      7f0005d39580ba537d4f9581b47c28adf132a6586d62881a62cd56fa1b24ab27

    • SHA512

      2688575f993dd7c2b0bff1634465149103412032bc882d09ccd492033ec94b27c84e4a1655118264728fea358969504ff748a8e6fe73dd313789f2a2d142f15a

    • SSDEEP

      786432:F6HKbIBBYy9IMhfpNIubCq9iS2wvX1RA6rxiShm0RML1P:+iI3/9IM6uejAX1RUShT

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks