General

  • Target

    1f51c76ae0a8503beb1c9d65b93326a5eedeb36506cc404a5ad3ae381fb0acf7

  • Size

    3.9MB

  • Sample

    241227-yhxybaylgz

  • MD5

    3bb190f592366f7550d892609267b217

  • SHA1

    1aa182b79728e3689ab16939fd536385276eecc1

  • SHA256

    1f51c76ae0a8503beb1c9d65b93326a5eedeb36506cc404a5ad3ae381fb0acf7

  • SHA512

    9598d6959ed9fa9905c045117481658f55f0c98182b1de3c6dc91037102c8b6d138d33bb1ebf13bb940a9c158997f5e4dc7329a4b0581633b2485ccb82eec99e

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFripiP:RFQWEPnPBnEmOKIbGr

Malware Config

Targets

    • Target

      1f51c76ae0a8503beb1c9d65b93326a5eedeb36506cc404a5ad3ae381fb0acf7

    • Size

      3.9MB

    • MD5

      3bb190f592366f7550d892609267b217

    • SHA1

      1aa182b79728e3689ab16939fd536385276eecc1

    • SHA256

      1f51c76ae0a8503beb1c9d65b93326a5eedeb36506cc404a5ad3ae381fb0acf7

    • SHA512

      9598d6959ed9fa9905c045117481658f55f0c98182b1de3c6dc91037102c8b6d138d33bb1ebf13bb940a9c158997f5e4dc7329a4b0581633b2485ccb82eec99e

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFripiP:RFQWEPnPBnEmOKIbGr

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (222) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks