General

  • Target

    8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69

  • Size

    8.3MB

  • Sample

    241205-akvnzaylbw

  • MD5

    11cfa26bba79670eea316ba55f0b1043

  • SHA1

    8c513befaa66ee2aa762a7b26dac39cacbe1aeac

  • SHA256

    8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69

  • SHA512

    52f351552912e64188891725f515433630016f2275c553cbba5c98f7b1968d2aca0aaf1d5feb3e154b820cfb5159cf7d8c4052c0e7172beb1ade0217243cc605

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEg1:RFQWEPnPBnEXPEL

Malware Config

Targets

    • Target

      8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69

    • Size

      8.3MB

    • MD5

      11cfa26bba79670eea316ba55f0b1043

    • SHA1

      8c513befaa66ee2aa762a7b26dac39cacbe1aeac

    • SHA256

      8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69

    • SHA512

      52f351552912e64188891725f515433630016f2275c553cbba5c98f7b1968d2aca0aaf1d5feb3e154b820cfb5159cf7d8c4052c0e7172beb1ade0217243cc605

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEg1:RFQWEPnPBnEXPEL

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (200) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks