General
-
Target
73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2
-
Size
6.5MB
-
Sample
241227-yryafayqer
-
MD5
c92d7a2fac3a4e82d3c44a7105b2b36e
-
SHA1
cd3ee7e3072fd3a34db3cc486dc060675d7d31b5
-
SHA256
73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2
-
SHA512
006cc7cc74ac097fa18e6585bb77729977cece28ea8950c3c29b4f2604632009fc0f425f9fcb91109494bd668b00404c013bae035f45d4b5e491f6f44ad775fd
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTx:RFQWEPnPBnEAsiC592Tx
Static task
static1
Behavioral task
behavioral1
Sample
73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2
-
Size
6.5MB
-
MD5
c92d7a2fac3a4e82d3c44a7105b2b36e
-
SHA1
cd3ee7e3072fd3a34db3cc486dc060675d7d31b5
-
SHA256
73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2
-
SHA512
006cc7cc74ac097fa18e6585bb77729977cece28ea8950c3c29b4f2604632009fc0f425f9fcb91109494bd668b00404c013bae035f45d4b5e491f6f44ad775fd
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTx:RFQWEPnPBnEAsiC592Tx
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (107) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-