General

  • Target

    73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2

  • Size

    6.5MB

  • Sample

    241227-yryafayqer

  • MD5

    c92d7a2fac3a4e82d3c44a7105b2b36e

  • SHA1

    cd3ee7e3072fd3a34db3cc486dc060675d7d31b5

  • SHA256

    73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2

  • SHA512

    006cc7cc74ac097fa18e6585bb77729977cece28ea8950c3c29b4f2604632009fc0f425f9fcb91109494bd668b00404c013bae035f45d4b5e491f6f44ad775fd

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTx:RFQWEPnPBnEAsiC592Tx

Malware Config

Targets

    • Target

      73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2

    • Size

      6.5MB

    • MD5

      c92d7a2fac3a4e82d3c44a7105b2b36e

    • SHA1

      cd3ee7e3072fd3a34db3cc486dc060675d7d31b5

    • SHA256

      73aa60a6934a503658c4f7df4ba463ac1fc1dbddce00dd9dfe9e8ddfb6e8fbe2

    • SHA512

      006cc7cc74ac097fa18e6585bb77729977cece28ea8950c3c29b4f2604632009fc0f425f9fcb91109494bd668b00404c013bae035f45d4b5e491f6f44ad775fd

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTx:RFQWEPnPBnEAsiC592Tx

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (107) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks