General
-
Target
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe
-
Size
112KB
-
Sample
241128-kmnnjsxrcn
-
MD5
0c84e0d44bcd5fcbf1a401cbb17192e8
-
SHA1
41fa473131dbd2f80d2f9546a94b4b1bb420eff1
-
SHA256
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da
-
SHA512
669c2508d5fab91b1ffa12bbd29fc5326f5d72ba0b16fa5c598cd6d068c18191de44b8249eaccc9771a774c218853f10f04fa98fad1d48c83b1236d4f10363e6
-
SSDEEP
1536:kLXB65939tY6HBg4sXJ9hAchXFc6cIbwWLnV0AchXFsOcVf22U1v:kLk395hYXJ9hAcMDenCAcroUl
Static task
static1
Behavioral task
behavioral1
Sample
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe
-
Size
112KB
-
MD5
0c84e0d44bcd5fcbf1a401cbb17192e8
-
SHA1
41fa473131dbd2f80d2f9546a94b4b1bb420eff1
-
SHA256
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da
-
SHA512
669c2508d5fab91b1ffa12bbd29fc5326f5d72ba0b16fa5c598cd6d068c18191de44b8249eaccc9771a774c218853f10f04fa98fad1d48c83b1236d4f10363e6
-
SSDEEP
1536:kLXB65939tY6HBg4sXJ9hAchXFc6cIbwWLnV0AchXFsOcVf22U1v:kLk395hYXJ9hAcMDenCAcroUl
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1