General
-
Target
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0
-
Size
6.9MB
-
Sample
241227-yhjexsynek
-
MD5
cdd29877b9558072f98482fa8b4debb9
-
SHA1
2bc64d0bfcff2573210440b8959774b32f2fdd09
-
SHA256
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0
-
SHA512
297a90929cf740f54ef8446ffa7b84d22310c0f60e80c4053677805038fe7411c8d74dc93b76a02be8f0667e8a24ddf3adfbafec190a7329222e7f43bcdf03ae
-
SSDEEP
196608:RFQWEPnPBnEmOKIbGFFQWEPnPBnEmOKIbGt:PEPnPBnbOejEPnPBnbOet
Static task
static1
Behavioral task
behavioral1
Sample
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0
-
Size
6.9MB
-
MD5
cdd29877b9558072f98482fa8b4debb9
-
SHA1
2bc64d0bfcff2573210440b8959774b32f2fdd09
-
SHA256
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0
-
SHA512
297a90929cf740f54ef8446ffa7b84d22310c0f60e80c4053677805038fe7411c8d74dc93b76a02be8f0667e8a24ddf3adfbafec190a7329222e7f43bcdf03ae
-
SSDEEP
196608:RFQWEPnPBnEmOKIbGFFQWEPnPBnEmOKIbGt:PEPnPBnbOejEPnPBnbOet
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (106) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-