Resubmissions

19-12-2024 22:13

241219-1472hs1nds 10

19-12-2024 21:43

241219-1kzwss1maj 10

General

  • Target

    481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734dN.exe

  • Size

    2.4MB

  • Sample

    241219-1472hs1nds

  • MD5

    0850fb73ac5cf974c11c0a78f2cc0a80

  • SHA1

    f05cc0495fe2a239c76625e6be51f3d52fdcdea2

  • SHA256

    481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734d

  • SHA512

    30dae41f217a94117d67a4a8c782386cd8cb892ce4d0f05e4d9afcab1b9427d3ce3675e411fda2b032d74a38c1fa50f7659b2a8c0580fc78e3945292a3215fa9

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3olj3:RF8QUitE4iLqaPWGnEvY

Malware Config

Targets

    • Target

      481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734dN.exe

    • Size

      2.4MB

    • MD5

      0850fb73ac5cf974c11c0a78f2cc0a80

    • SHA1

      f05cc0495fe2a239c76625e6be51f3d52fdcdea2

    • SHA256

      481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734d

    • SHA512

      30dae41f217a94117d67a4a8c782386cd8cb892ce4d0f05e4d9afcab1b9427d3ce3675e411fda2b032d74a38c1fa50f7659b2a8c0580fc78e3945292a3215fa9

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3olj3:RF8QUitE4iLqaPWGnEvY

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (564) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks