General
-
Target
79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d
-
Size
9.9MB
-
Sample
241227-ydaxzsykh1
-
MD5
e9957fce6989f2e51fe69394ec77b129
-
SHA1
1cec361fad65c3c9dbf5ce3aeb95cd6d8c629255
-
SHA256
79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d
-
SHA512
defccb06b8ccf6b29bf81a85913ef1880a0e668a334977a9967cb2db25205ff6db9c02d2de4be55705b564009aedea63c39f2fecf9ff4cab9daacb9b395c7557
-
SSDEEP
196608:RFQWEPnPBnEmOKIbGdCzNA7rlvRz1rrFBV6tpjuj6gYPKHCKsi:PEPnPBnbOedjUtYj6gYPYP
Static task
static1
Behavioral task
behavioral1
Sample
79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d
-
Size
9.9MB
-
MD5
e9957fce6989f2e51fe69394ec77b129
-
SHA1
1cec361fad65c3c9dbf5ce3aeb95cd6d8c629255
-
SHA256
79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d
-
SHA512
defccb06b8ccf6b29bf81a85913ef1880a0e668a334977a9967cb2db25205ff6db9c02d2de4be55705b564009aedea63c39f2fecf9ff4cab9daacb9b395c7557
-
SSDEEP
196608:RFQWEPnPBnEmOKIbGdCzNA7rlvRz1rrFBV6tpjuj6gYPKHCKsi:PEPnPBnbOedjUtYj6gYPYP
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (155) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-