General

  • Target

    2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9N.exe

  • Size

    2.3MB

  • Sample

    241219-hf73hatnfq

  • MD5

    b4796495b577a73ee48273bb207d23b0

  • SHA1

    df5bcaf21843977a211aa805e369025d0f01faaf

  • SHA256

    2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9

  • SHA512

    3fac0de7c6450be2b8a2cd7654b5884717d98878ea1639902146a8ac4e323985efd652fef67fa54f6f58cd8314f234c562cf5336789400691189dd81d8e43fc9

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3xt:RF8QUitE4iLqaPWGnEvr

Malware Config

Targets

    • Target

      2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9N.exe

    • Size

      2.3MB

    • MD5

      b4796495b577a73ee48273bb207d23b0

    • SHA1

      df5bcaf21843977a211aa805e369025d0f01faaf

    • SHA256

      2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9

    • SHA512

      3fac0de7c6450be2b8a2cd7654b5884717d98878ea1639902146a8ac4e323985efd652fef67fa54f6f58cd8314f234c562cf5336789400691189dd81d8e43fc9

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3xt:RF8QUitE4iLqaPWGnEvr

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (224) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks