General

  • Target

    8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96

  • Size

    6.2MB

  • Sample

    241227-x5nsgsyjhw

  • MD5

    04b19b217d78181c8951c1a097cee7aa

  • SHA1

    b4839f938fb95e3ab97bf1872efdf0018ed4a7e3

  • SHA256

    8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96

  • SHA512

    aa2b710d1993b6f50e76ec5af5573592870d8f7caf4d338bf8797c6dc134436693d23d305e2b60a5863e66f2e2b858fa7503b996e427785e4b14958571cf83c8

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTe:RFQWEPnPBnEQsiC592Te

Malware Config

Targets

    • Target

      8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96

    • Size

      6.2MB

    • MD5

      04b19b217d78181c8951c1a097cee7aa

    • SHA1

      b4839f938fb95e3ab97bf1872efdf0018ed4a7e3

    • SHA256

      8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96

    • SHA512

      aa2b710d1993b6f50e76ec5af5573592870d8f7caf4d338bf8797c6dc134436693d23d305e2b60a5863e66f2e2b858fa7503b996e427785e4b14958571cf83c8

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTe:RFQWEPnPBnEQsiC592Te

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (124) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks