General
-
Target
1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76N.exe
-
Size
5.5MB
-
Sample
241204-dflgaatmhq
-
MD5
2000b158c5d4cb29080c614e1703b4b0
-
SHA1
6e53a872e56744ea729dce26735f808acf805f11
-
SHA256
1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76
-
SHA512
c578c42f14b31bcf17a76eea2ff5b06bb997171c7090d225a5eda3edf8a0d778411068bc02498a67f16c3e4a5813953eae591a23075689a512b2a2f61dbf2b2b
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StA:RFQWEPnPBnEXPS
Static task
static1
Behavioral task
behavioral1
Sample
1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76N.exe
-
Size
5.5MB
-
MD5
2000b158c5d4cb29080c614e1703b4b0
-
SHA1
6e53a872e56744ea729dce26735f808acf805f11
-
SHA256
1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76
-
SHA512
c578c42f14b31bcf17a76eea2ff5b06bb997171c7090d225a5eda3edf8a0d778411068bc02498a67f16c3e4a5813953eae591a23075689a512b2a2f61dbf2b2b
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StA:RFQWEPnPBnEXPS
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (198) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-