General
-
Target
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69
-
Size
8.3MB
-
Sample
241205-akvnzaylbw
-
MD5
11cfa26bba79670eea316ba55f0b1043
-
SHA1
8c513befaa66ee2aa762a7b26dac39cacbe1aeac
-
SHA256
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69
-
SHA512
52f351552912e64188891725f515433630016f2275c553cbba5c98f7b1968d2aca0aaf1d5feb3e154b820cfb5159cf7d8c4052c0e7172beb1ade0217243cc605
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEg1:RFQWEPnPBnEXPEL
Static task
static1
Behavioral task
behavioral1
Sample
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69
-
Size
8.3MB
-
MD5
11cfa26bba79670eea316ba55f0b1043
-
SHA1
8c513befaa66ee2aa762a7b26dac39cacbe1aeac
-
SHA256
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69
-
SHA512
52f351552912e64188891725f515433630016f2275c553cbba5c98f7b1968d2aca0aaf1d5feb3e154b820cfb5159cf7d8c4052c0e7172beb1ade0217243cc605
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEg1:RFQWEPnPBnEXPEL
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (200) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-