General

  • Target

    78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321

  • Size

    4.4MB

  • Sample

    241227-ylw57aypdn

  • MD5

    12869cf1acd5a8984588350415fdb4c4

  • SHA1

    fb49801c672ce464503e30f93448c6a44e1b81e7

  • SHA256

    78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321

  • SHA512

    35973c6c826d2308164bcfe50c91e4781e50a9107b6b2354e3f7bfc771d248e1aeba26410236dc90c44d54775c834a613795f0912b993c998814e9e5b4576705

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLYdRba8fD8qinfMSKJXM:RF8QUitE4iLqaPWGnEvS9E8/IJs1

Malware Config

Targets

    • Target

      78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321

    • Size

      4.4MB

    • MD5

      12869cf1acd5a8984588350415fdb4c4

    • SHA1

      fb49801c672ce464503e30f93448c6a44e1b81e7

    • SHA256

      78743ccb706fdfc9675346d6bbd2a2b53fa56fe5b83fe866d602c36b0b5d5321

    • SHA512

      35973c6c826d2308164bcfe50c91e4781e50a9107b6b2354e3f7bfc771d248e1aeba26410236dc90c44d54775c834a613795f0912b993c998814e9e5b4576705

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLYdRba8fD8qinfMSKJXM:RF8QUitE4iLqaPWGnEvS9E8/IJs1

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (165) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks