General
-
Target
89eef529153c95944a83b90eef7ead1489d9298a5acd2e37c98c5a9640657e8fN.exe
-
Size
2.2MB
-
Sample
241219-g6l3aasmaz
-
MD5
02499a163b7d7ce0c75c02d6cf197270
-
SHA1
3c73a79f62848a7d351583f5c6efdb3126552e3d
-
SHA256
89eef529153c95944a83b90eef7ead1489d9298a5acd2e37c98c5a9640657e8f
-
SHA512
b01afc016f094d23551bf3e8c5e02874d3d7f56bf48f3bf960f4e56760c90f2098fd612f2c8fde0e004727bcb85cdefa23abf98171fcf35276d4179a58521b06
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3M:RF8QUitE4iLqaPWGnEv8
Static task
static1
Behavioral task
behavioral1
Sample
89eef529153c95944a83b90eef7ead1489d9298a5acd2e37c98c5a9640657e8fN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89eef529153c95944a83b90eef7ead1489d9298a5acd2e37c98c5a9640657e8fN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
89eef529153c95944a83b90eef7ead1489d9298a5acd2e37c98c5a9640657e8fN.exe
-
Size
2.2MB
-
MD5
02499a163b7d7ce0c75c02d6cf197270
-
SHA1
3c73a79f62848a7d351583f5c6efdb3126552e3d
-
SHA256
89eef529153c95944a83b90eef7ead1489d9298a5acd2e37c98c5a9640657e8f
-
SHA512
b01afc016f094d23551bf3e8c5e02874d3d7f56bf48f3bf960f4e56760c90f2098fd612f2c8fde0e004727bcb85cdefa23abf98171fcf35276d4179a58521b06
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3M:RF8QUitE4iLqaPWGnEv8
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (223) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-