General

  • Target

    1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76N.exe

  • Size

    5.5MB

  • Sample

    241204-dflgaatmhq

  • MD5

    2000b158c5d4cb29080c614e1703b4b0

  • SHA1

    6e53a872e56744ea729dce26735f808acf805f11

  • SHA256

    1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76

  • SHA512

    c578c42f14b31bcf17a76eea2ff5b06bb997171c7090d225a5eda3edf8a0d778411068bc02498a67f16c3e4a5813953eae591a23075689a512b2a2f61dbf2b2b

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StA:RFQWEPnPBnEXPS

Malware Config

Targets

    • Target

      1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76N.exe

    • Size

      5.5MB

    • MD5

      2000b158c5d4cb29080c614e1703b4b0

    • SHA1

      6e53a872e56744ea729dce26735f808acf805f11

    • SHA256

      1e4cafefe33f6cd6e70a4eeaa12e674457b586d995257b2d17f05addf1564b76

    • SHA512

      c578c42f14b31bcf17a76eea2ff5b06bb997171c7090d225a5eda3edf8a0d778411068bc02498a67f16c3e4a5813953eae591a23075689a512b2a2f61dbf2b2b

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StA:RFQWEPnPBnEXPS

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (198) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks