General

  • Target

    7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925

  • Size

    3.9MB

  • Sample

    241227-yd5scsymfj

  • MD5

    1bece18acdaf3bab0a606daa2345dfda

  • SHA1

    8f9a524255dd947882bca00afccba2ebb719b3ef

  • SHA256

    7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925

  • SHA512

    ca0d58566fb935b79a9ca932cbf7f226b3d81021eed9e135d632facc9f5593a8bd6410a95d1ebadf5758fc0567e2697a59e17a2bf5cce75da9aa7e97419a843f

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77SFFXARrP/WH5f:RF8QUitE4iLqaPWGnEvS9EjyWHh

Malware Config

Targets

    • Target

      7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925

    • Size

      3.9MB

    • MD5

      1bece18acdaf3bab0a606daa2345dfda

    • SHA1

      8f9a524255dd947882bca00afccba2ebb719b3ef

    • SHA256

      7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925

    • SHA512

      ca0d58566fb935b79a9ca932cbf7f226b3d81021eed9e135d632facc9f5593a8bd6410a95d1ebadf5758fc0567e2697a59e17a2bf5cce75da9aa7e97419a843f

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHklZ77SFFXARrP/WH5f:RF8QUitE4iLqaPWGnEvS9EjyWHh

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (220) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks