Resubmissions

27-12-2024 19:21

241227-x258csykgr 10

27-12-2024 19:21

241227-x2vrmaykgm 10

General

  • Target

    8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d

  • Size

    4.0MB

  • Sample

    241227-x258csykgr

  • MD5

    b8f4d3e558f7069b5020f7024e6480b3

  • SHA1

    49da493a24e179fac1c0217577966c9af42954b7

  • SHA256

    8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d

  • SHA512

    21e88209d4059a3135e81d7b403806f26266548522b06123192f4df15cb72d1896d3801cd35581d2b9e92d76df61e606fca2f46a0a4fd30afc8f869f0b63223d

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrpHv/kAZIlnHyA:RFQWEPnPBnEmOKIbGpPMAZcyA

Malware Config

Targets

    • Target

      8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d

    • Size

      4.0MB

    • MD5

      b8f4d3e558f7069b5020f7024e6480b3

    • SHA1

      49da493a24e179fac1c0217577966c9af42954b7

    • SHA256

      8d8fceab6594860d035438ce97bfc7a0401bbece8604e9a84c0fa7beea16828d

    • SHA512

      21e88209d4059a3135e81d7b403806f26266548522b06123192f4df15cb72d1896d3801cd35581d2b9e92d76df61e606fca2f46a0a4fd30afc8f869f0b63223d

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrpHv/kAZIlnHyA:RFQWEPnPBnEmOKIbGpPMAZcyA

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (221) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks