General
-
Target
6c014c435999946756265c8f7ebe8e967ee68d9a79fd458b942a16185e9fb564
-
Size
123KB
-
Sample
241120-3ytm2swmbw
-
MD5
68fc0a389597e08de8d2668f768283c3
-
SHA1
ca00a153d98913a1d00ef500b522d9a85de5cb3a
-
SHA256
6c014c435999946756265c8f7ebe8e967ee68d9a79fd458b942a16185e9fb564
-
SHA512
8f393fbdab6fdc720156f396d60ef0ecbfaa6485b9c5d375dd1a3bf1f00fb40daa656b39cf2e18641f4692b4d2c1cbd9ccad3b1f52191aac9a83fbaee314d3ca
-
SSDEEP
1536:ELXB65939tY6HBg4sXJWAchXFW8KfHzb4+LnVRAchXFnIfbmUOcVf2S7naxI:ELk395hYXJWAcm8tWnvAcYfiDoH
Static task
static1
Behavioral task
behavioral1
Sample
6c014c435999946756265c8f7ebe8e967ee68d9a79fd458b942a16185e9fb564.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
6c014c435999946756265c8f7ebe8e967ee68d9a79fd458b942a16185e9fb564
-
Size
123KB
-
MD5
68fc0a389597e08de8d2668f768283c3
-
SHA1
ca00a153d98913a1d00ef500b522d9a85de5cb3a
-
SHA256
6c014c435999946756265c8f7ebe8e967ee68d9a79fd458b942a16185e9fb564
-
SHA512
8f393fbdab6fdc720156f396d60ef0ecbfaa6485b9c5d375dd1a3bf1f00fb40daa656b39cf2e18641f4692b4d2c1cbd9ccad3b1f52191aac9a83fbaee314d3ca
-
SSDEEP
1536:ELXB65939tY6HBg4sXJWAchXFW8KfHzb4+LnVRAchXFnIfbmUOcVf2S7naxI:ELk395hYXJWAcm8tWnvAcYfiDoH
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1