General
-
Target
76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0
-
Size
3.6MB
-
Sample
241227-ynkvyayphj
-
MD5
6a8f40126e9defe064e8dec277ab2bff
-
SHA1
3cad375260b6ee85e14749d224a19cd58ec9e023
-
SHA256
76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0
-
SHA512
f35767813b1510bfb88c1a5f49a909e79e4cf801c47b19ea961a35c50fd33212a68573f522deb21aa86d511f2b3267d9c34445fa211f8c4bcc8b2f508661ca3d
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgoVjIymPh7TTY9K:RF8QUitE4iLqaPWGnEvK7R9TD
Static task
static1
Behavioral task
behavioral1
Sample
76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0
-
Size
3.6MB
-
MD5
6a8f40126e9defe064e8dec277ab2bff
-
SHA1
3cad375260b6ee85e14749d224a19cd58ec9e023
-
SHA256
76d73b8e49c999dd262e45a1e2c88ef429da9d4bd98fc7f83f477da0bd6f24d0
-
SHA512
f35767813b1510bfb88c1a5f49a909e79e4cf801c47b19ea961a35c50fd33212a68573f522deb21aa86d511f2b3267d9c34445fa211f8c4bcc8b2f508661ca3d
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgoVjIymPh7TTY9K:RF8QUitE4iLqaPWGnEvK7R9TD
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (182) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-