General
-
Target
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
-
Size
3.0MB
-
Sample
241205-fjlbsswjdp
-
MD5
a0603251331725cbcbde1f6189d22190
-
SHA1
0708b11c6c53a3a43260665436af65b313aa0a11
-
SHA256
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13b
-
SHA512
8386a093a92bbb515b217c940e3e296150fae35aaa8a8e2869fcb3249d42b1a0eb55b02f6a65f46fdd5bc43646e83f4fc332fe97618bd793a6370cf6c5cfdf14
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiK+:RF8QUitE4iLqaPWGnEvN
Static task
static1
Behavioral task
behavioral1
Sample
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
-
Size
3.0MB
-
MD5
a0603251331725cbcbde1f6189d22190
-
SHA1
0708b11c6c53a3a43260665436af65b313aa0a11
-
SHA256
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13b
-
SHA512
8386a093a92bbb515b217c940e3e296150fae35aaa8a8e2869fcb3249d42b1a0eb55b02f6a65f46fdd5bc43646e83f4fc332fe97618bd793a6370cf6c5cfdf14
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiK+:RF8QUitE4iLqaPWGnEvN
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (213) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-