General
-
Target
78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321
-
Size
4.4MB
-
Sample
241227-ylw57aypdn
-
MD5
12869cf1acd5a8984588350415fdb4c4
-
SHA1
fb49801c672ce464503e30f93448c6a44e1b81e7
-
SHA256
78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321
-
SHA512
35973c6c826d2308164bcfe50c91e4781e50a9107b6b2354e3f7bfc771d248e1aeba26410236dc90c44d54775c834a613795f0912b993c998814e9e5b4576705
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLYdRba8fD8qinfMSKJXM:RF8QUitE4iLqaPWGnEvS9E8/IJs1
Static task
static1
Behavioral task
behavioral1
Sample
78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321
-
Size
4.4MB
-
MD5
12869cf1acd5a8984588350415fdb4c4
-
SHA1
fb49801c672ce464503e30f93448c6a44e1b81e7
-
SHA256
78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321
-
SHA512
35973c6c826d2308164bcfe50c91e4781e50a9107b6b2354e3f7bfc771d248e1aeba26410236dc90c44d54775c834a613795f0912b993c998814e9e5b4576705
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLYdRba8fD8qinfMSKJXM:RF8QUitE4iLqaPWGnEvS9E8/IJs1
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (165) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-