General

  • Target

    846e4863e5e6ec0908b1b65f3b30cbe3a55e69e90f85c82bc566fd94998d66f7

  • Size

    3.2MB

  • Sample

    241227-ycfrvaykg1

  • MD5

    47d06e6b32e5e3eb65911d608a281f6f

  • SHA1

    58dfba0294740085af8b3e4733bca9627b4254a8

  • SHA256

    846e4863e5e6ec0908b1b65f3b30cbe3a55e69e90f85c82bc566fd94998d66f7

  • SHA512

    2f04eb93663d74a14f82872d6d1efc3165ab387d14566128d3d0a41aaeb895d25d70bb7038f83e6788e05b79f82937a5774b00dccc7591afd8b6668714931dcf

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVPYOKQrgCGuVjIymPh7TTY9y:RF8QUitE4iLqaPWGnEv+OKQr8TTb

Malware Config

Targets

    • Target

      846e4863e5e6ec0908b1b65f3b30cbe3a55e69e90f85c82bc566fd94998d66f7

    • Size

      3.2MB

    • MD5

      47d06e6b32e5e3eb65911d608a281f6f

    • SHA1

      58dfba0294740085af8b3e4733bca9627b4254a8

    • SHA256

      846e4863e5e6ec0908b1b65f3b30cbe3a55e69e90f85c82bc566fd94998d66f7

    • SHA512

      2f04eb93663d74a14f82872d6d1efc3165ab387d14566128d3d0a41aaeb895d25d70bb7038f83e6788e05b79f82937a5774b00dccc7591afd8b6668714931dcf

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVPYOKQrgCGuVjIymPh7TTY9y:RF8QUitE4iLqaPWGnEv+OKQr8TTb

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (197) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks