General
-
Target
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d
-
Size
3.9MB
-
Sample
241227-x779xaykcv
-
MD5
caa97c9ce1ac5507dd9386041cec5398
-
SHA1
2f95d85d31c8f02ca88c9e9f9bcb4fdcc9d6c03d
-
SHA256
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d
-
SHA512
76bff010013bbeaf6a6fc8787b8e1ae2a078c802ab0c1f9edd4daf36fe3608e1f8b9560df0be4daad2529ebd66518c669b697bb170fe2d234de0209276d3892e
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RByF8QUitE45:RFQWEPnPBnEgyFQWEs
Static task
static1
Behavioral task
behavioral1
Sample
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d
-
Size
3.9MB
-
MD5
caa97c9ce1ac5507dd9386041cec5398
-
SHA1
2f95d85d31c8f02ca88c9e9f9bcb4fdcc9d6c03d
-
SHA256
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d
-
SHA512
76bff010013bbeaf6a6fc8787b8e1ae2a078c802ab0c1f9edd4daf36fe3608e1f8b9560df0be4daad2529ebd66518c669b697bb170fe2d234de0209276d3892e
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RByF8QUitE45:RFQWEPnPBnEgyFQWEs
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (189) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-