General

  • Target

    91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca

  • Size

    2.9MB

  • Sample

    241227-xp378sxqhw

  • MD5

    75ec6462a567274bbd09a6c1bb9cd870

  • SHA1

    309ac40f9f4fe6b8dfe6db1288f82ed8ada0b281

  • SHA256

    91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca

  • SHA512

    6b7ff62f3b1dbfccedd2a81d61ac881a1f969b12e8c863c14f861a488f046900f6cbf633c1c8c4a44a741a4cfd8c256f822a67d6d0b138c8247ada58f56a30ad

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMm8uE:RF8QUitE4iLqaPWGnEvgM7Mn

Malware Config

Targets

    • Target

      91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca

    • Size

      2.9MB

    • MD5

      75ec6462a567274bbd09a6c1bb9cd870

    • SHA1

      309ac40f9f4fe6b8dfe6db1288f82ed8ada0b281

    • SHA256

      91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca

    • SHA512

      6b7ff62f3b1dbfccedd2a81d61ac881a1f969b12e8c863c14f861a488f046900f6cbf633c1c8c4a44a741a4cfd8c256f822a67d6d0b138c8247ada58f56a30ad

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMm8uE:RF8QUitE4iLqaPWGnEvgM7Mn

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (225) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks