General
-
Target
895f4f87426d17b92e8e2d9ec2b4f13eb9040cbec54c1e1b6b75d847e6fa0ffa
-
Size
3.6MB
-
Sample
241227-x7c4rsykbw
-
MD5
f316bd28d43accb063c055c9530861bc
-
SHA1
aa8bc6ac4c7e526000950ac414d986842c3137bd
-
SHA256
895f4f87426d17b92e8e2d9ec2b4f13eb9040cbec54c1e1b6b75d847e6fa0ffa
-
SHA512
b09b104e2fa404a48bc4846c40295806dce3221e15c13f6fd3ed76ebdd1c472d44ab25b82b52ba126b33d90898cde5ccdb09be2d9ef5264a4ec5071ef84562d8
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77SFQJIUe:RF8QUitE4iLqaPWGnEvS9Ejv
Static task
static1
Behavioral task
behavioral1
Sample
895f4f87426d17b92e8e2d9ec2b4f13eb9040cbec54c1e1b6b75d847e6fa0ffa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
895f4f87426d17b92e8e2d9ec2b4f13eb9040cbec54c1e1b6b75d847e6fa0ffa.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
895f4f87426d17b92e8e2d9ec2b4f13eb9040cbec54c1e1b6b75d847e6fa0ffa
-
Size
3.6MB
-
MD5
f316bd28d43accb063c055c9530861bc
-
SHA1
aa8bc6ac4c7e526000950ac414d986842c3137bd
-
SHA256
895f4f87426d17b92e8e2d9ec2b4f13eb9040cbec54c1e1b6b75d847e6fa0ffa
-
SHA512
b09b104e2fa404a48bc4846c40295806dce3221e15c13f6fd3ed76ebdd1c472d44ab25b82b52ba126b33d90898cde5ccdb09be2d9ef5264a4ec5071ef84562d8
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77SFQJIUe:RF8QUitE4iLqaPWGnEvS9Ejv
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (187) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-