General
-
Target
8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d
-
Size
4.0MB
-
Sample
241227-x258csykgr
-
MD5
b8f4d3e558f7069b5020f7024e6480b3
-
SHA1
49da493a24e179fac1c0217577966c9af42954b7
-
SHA256
8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d
-
SHA512
21e88209d4059a3135e81d7b403806f26266548522b06123192f4df15cb72d1896d3801cd35581d2b9e92d76df61e606fca2f46a0a4fd30afc8f869f0b63223d
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrpHv/kAZIlnHyA:RFQWEPnPBnEmOKIbGpPMAZcyA
Static task
static1
Behavioral task
behavioral1
Sample
8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d
-
Size
4.0MB
-
MD5
b8f4d3e558f7069b5020f7024e6480b3
-
SHA1
49da493a24e179fac1c0217577966c9af42954b7
-
SHA256
8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d
-
SHA512
21e88209d4059a3135e81d7b403806f26266548522b06123192f4df15cb72d1896d3801cd35581d2b9e92d76df61e606fca2f46a0a4fd30afc8f869f0b63223d
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrpHv/kAZIlnHyA:RFQWEPnPBnEmOKIbGpPMAZcyA
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (221) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-