General

  • Target

    64a91cc3b0732399297e7afde52698d2e093d853dacace4503bd07f606c967ce.exe

  • Size

    3.9MB

  • Sample

    241127-rtyknatmam

  • MD5

    d7fd4d232e6944306d7756dbb57d9f82

  • SHA1

    4216e260ee2c9b683a6b886dd66b0f1b37ce2869

  • SHA256

    64a91cc3b0732399297e7afde52698d2e093d853dacace4503bd07f606c967ce

  • SHA512

    97d00d3441ca2507a284f1886f5ea7f0b9a3d6b6863fe56ba6784e628d571ff2e681f1fc00bc52bb4e9005be2efc1d2ffcd7ba3a19e8f747023b14dd98ae785b

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77Szh9ownI:RF8QUitE4iLqaPWGnEvS9Ejzh9oEI

Malware Config

Targets

    • Target

      64a91cc3b0732399297e7afde52698d2e093d853dacace4503bd07f606c967ce.exe

    • Size

      3.9MB

    • MD5

      d7fd4d232e6944306d7756dbb57d9f82

    • SHA1

      4216e260ee2c9b683a6b886dd66b0f1b37ce2869

    • SHA256

      64a91cc3b0732399297e7afde52698d2e093d853dacace4503bd07f606c967ce

    • SHA512

      97d00d3441ca2507a284f1886f5ea7f0b9a3d6b6863fe56ba6784e628d571ff2e681f1fc00bc52bb4e9005be2efc1d2ffcd7ba3a19e8f747023b14dd98ae785b

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77Szh9ownI:RF8QUitE4iLqaPWGnEvS9Ejzh9oEI

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (196) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks