General

  • Target

    79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d

  • Size

    9.9MB

  • Sample

    241227-ydaxzsykh1

  • MD5

    e9957fce6989f2e51fe69394ec77b129

  • SHA1

    1cec361fad65c3c9dbf5ce3aeb95cd6d8c629255

  • SHA256

    79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d

  • SHA512

    defccb06b8ccf6b29bf81a85913ef1880a0e668a334977a9967cb2db25205ff6db9c02d2de4be55705b564009aedea63c39f2fecf9ff4cab9daacb9b395c7557

  • SSDEEP

    196608:RFQWEPnPBnEmOKIbGdCzNA7rlvRz1rrFBV6tpjuj6gYPKHCKsi:PEPnPBnbOedjUtYj6gYPYP

Malware Config

Targets

    • Target

      79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d

    • Size

      9.9MB

    • MD5

      e9957fce6989f2e51fe69394ec77b129

    • SHA1

      1cec361fad65c3c9dbf5ce3aeb95cd6d8c629255

    • SHA256

      79703b07bfc8ca14a2b170305685558c6037f558443e6080124388d3cf38819d

    • SHA512

      defccb06b8ccf6b29bf81a85913ef1880a0e668a334977a9967cb2db25205ff6db9c02d2de4be55705b564009aedea63c39f2fecf9ff4cab9daacb9b395c7557

    • SSDEEP

      196608:RFQWEPnPBnEmOKIbGdCzNA7rlvRz1rrFBV6tpjuj6gYPKHCKsi:PEPnPBnbOedjUtYj6gYPYP

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (155) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks