General
-
Target
2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9N.exe
-
Size
2.3MB
-
Sample
241219-hf73hatnfq
-
MD5
b4796495b577a73ee48273bb207d23b0
-
SHA1
df5bcaf21843977a211aa805e369025d0f01faaf
-
SHA256
2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9
-
SHA512
3fac0de7c6450be2b8a2cd7654b5884717d98878ea1639902146a8ac4e323985efd652fef67fa54f6f58cd8314f234c562cf5336789400691189dd81d8e43fc9
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3xt:RF8QUitE4iLqaPWGnEvr
Static task
static1
Behavioral task
behavioral1
Sample
2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9N.exe
-
Size
2.3MB
-
MD5
b4796495b577a73ee48273bb207d23b0
-
SHA1
df5bcaf21843977a211aa805e369025d0f01faaf
-
SHA256
2124b6cca004397d893eff47393bb82351152f5a3a7bfb5212fdadcc07d987c9
-
SHA512
3fac0de7c6450be2b8a2cd7654b5884717d98878ea1639902146a8ac4e323985efd652fef67fa54f6f58cd8314f234c562cf5336789400691189dd81d8e43fc9
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3xt:RF8QUitE4iLqaPWGnEvr
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (224) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-