General

  • Target

    76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0

  • Size

    3.6MB

  • Sample

    241227-ynkvyayphj

  • MD5

    6a8f40126e9defe064e8dec277ab2bff

  • SHA1

    3cad375260b6ee85e14749d224a19cd58ec9e023

  • SHA256

    76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0

  • SHA512

    f35767813b1510bfb88c1a5f49a909e79e4cf801c47b19ea961a35c50fd33212a68573f522deb21aa86d511f2b3267d9c34445fa211f8c4bcc8b2f508661ca3d

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgoVjIymPh7TTY9K:RF8QUitE4iLqaPWGnEvK7R9TD

Malware Config

Targets

    • Target

      76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0

    • Size

      3.6MB

    • MD5

      6a8f40126e9defe064e8dec277ab2bff

    • SHA1

      3cad375260b6ee85e14749d224a19cd58ec9e023

    • SHA256

      76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0

    • SHA512

      f35767813b1510bfb88c1a5f49a909e79e4cf801c47b19ea961a35c50fd33212a68573f522deb21aa86d511f2b3267d9c34445fa211f8c4bcc8b2f508661ca3d

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgoVjIymPh7TTY9K:RF8QUitE4iLqaPWGnEvK7R9TD

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (182) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks