General

  • Target

    0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0

  • Size

    6.9MB

  • Sample

    241227-yhjexsynek

  • MD5

    cdd29877b9558072f98482fa8b4debb9

  • SHA1

    2bc64d0bfcff2573210440b8959774b32f2fdd09

  • SHA256

    0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0

  • SHA512

    297a90929cf740f54ef8446ffa7b84d22310c0f60e80c4053677805038fe7411c8d74dc93b76a02be8f0667e8a24ddf3adfbafec190a7329222e7f43bcdf03ae

  • SSDEEP

    196608:RFQWEPnPBnEmOKIbGFFQWEPnPBnEmOKIbGt:PEPnPBnbOejEPnPBnbOet

Malware Config

Targets

    • Target

      0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0

    • Size

      6.9MB

    • MD5

      cdd29877b9558072f98482fa8b4debb9

    • SHA1

      2bc64d0bfcff2573210440b8959774b32f2fdd09

    • SHA256

      0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0

    • SHA512

      297a90929cf740f54ef8446ffa7b84d22310c0f60e80c4053677805038fe7411c8d74dc93b76a02be8f0667e8a24ddf3adfbafec190a7329222e7f43bcdf03ae

    • SSDEEP

      196608:RFQWEPnPBnEmOKIbGFFQWEPnPBnEmOKIbGt:PEPnPBnbOejEPnPBnbOet

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (106) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks