General

  • Target

    7c2322cd1f10e1df8ff5976947281954014a260348d8790d3d6a5138bda45580

  • Size

    3.2MB

  • Sample

    241227-yez89symhk

  • MD5

    7637944fd84ac44e58355bd74a0199f3

  • SHA1

    7f6e495792ed29659a59c678a6c32e9b6ae403d1

  • SHA256

    7c2322cd1f10e1df8ff5976947281954014a260348d8790d3d6a5138bda45580

  • SHA512

    924e613c94f009b9b655837ecf7bf76682602c3e54f5b59b5875aaed076808eb104e7b49541409d9d52cea32a31fe04f72b7cc7c3e512e9120168ec9ab494550

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiK7lji2Amw7OX:RF8QUitE4iLqaPWGnEvuX

Malware Config

Targets

    • Target

      7c2322cd1f10e1df8ff5976947281954014a260348d8790d3d6a5138bda45580

    • Size

      3.2MB

    • MD5

      7637944fd84ac44e58355bd74a0199f3

    • SHA1

      7f6e495792ed29659a59c678a6c32e9b6ae403d1

    • SHA256

      7c2322cd1f10e1df8ff5976947281954014a260348d8790d3d6a5138bda45580

    • SHA512

      924e613c94f009b9b655837ecf7bf76682602c3e54f5b59b5875aaed076808eb104e7b49541409d9d52cea32a31fe04f72b7cc7c3e512e9120168ec9ab494550

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiK7lji2Amw7OX:RF8QUitE4iLqaPWGnEvuX

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks