General
-
Target
8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96
-
Size
6.2MB
-
Sample
241227-x5nsgsyjhw
-
MD5
04b19b217d78181c8951c1a097cee7aa
-
SHA1
b4839f938fb95e3ab97bf1872efdf0018ed4a7e3
-
SHA256
8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96
-
SHA512
aa2b710d1993b6f50e76ec5af5573592870d8f7caf4d338bf8797c6dc134436693d23d305e2b60a5863e66f2e2b858fa7503b996e427785e4b14958571cf83c8
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTe:RFQWEPnPBnEQsiC592Te
Static task
static1
Behavioral task
behavioral1
Sample
8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96
-
Size
6.2MB
-
MD5
04b19b217d78181c8951c1a097cee7aa
-
SHA1
b4839f938fb95e3ab97bf1872efdf0018ed4a7e3
-
SHA256
8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96
-
SHA512
aa2b710d1993b6f50e76ec5af5573592870d8f7caf4d338bf8797c6dc134436693d23d305e2b60a5863e66f2e2b858fa7503b996e427785e4b14958571cf83c8
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTe:RFQWEPnPBnEQsiC592Te
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (124) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-