General
-
Target
7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925
-
Size
3.9MB
-
Sample
241227-yd5scsymfj
-
MD5
1bece18acdaf3bab0a606daa2345dfda
-
SHA1
8f9a524255dd947882bca00afccba2ebb719b3ef
-
SHA256
7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925
-
SHA512
ca0d58566fb935b79a9ca932cbf7f226b3d81021eed9e135d632facc9f5593a8bd6410a95d1ebadf5758fc0567e2697a59e17a2bf5cce75da9aa7e97419a843f
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77SFFXARrP/WH5f:RF8QUitE4iLqaPWGnEvS9EjyWHh
Static task
static1
Behavioral task
behavioral1
Sample
7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925
-
Size
3.9MB
-
MD5
1bece18acdaf3bab0a606daa2345dfda
-
SHA1
8f9a524255dd947882bca00afccba2ebb719b3ef
-
SHA256
7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925
-
SHA512
ca0d58566fb935b79a9ca932cbf7f226b3d81021eed9e135d632facc9f5593a8bd6410a95d1ebadf5758fc0567e2697a59e17a2bf5cce75da9aa7e97419a843f
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77SFFXARrP/WH5f:RF8QUitE4iLqaPWGnEvS9EjyWHh
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (220) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-