General

  • Target

    2024-12-28_6d9e95ccd5039f49bcc88ea5379b4a29_hijackloader_jaff

  • Size

    20.5MB

  • Sample

    241228-2as6yatncl

  • MD5

    6d9e95ccd5039f49bcc88ea5379b4a29

  • SHA1

    0e83f707e4321179b608d5401450e45b3c844532

  • SHA256

    b1a450ab3ca2b38605981891257e7d37090c5578e71e046411a45c479c234264

  • SHA512

    cc0f73ea9b611763c688fa68e09725af55ffffdf6200f5ce8cef4588156630060517c607b7ee4fe27ad1be155e4af150c9cb97f140ff63009640a3a9fceda22a

  • SSDEEP

    196608:RFQWEPnPBnEXPEtFQWEPnPBnEXPETR8N3MKFBIHuM/B:PEPnPBnnEPnPBnHR8N3MKFBIOMJ

Malware Config

Targets

    • Target

      2024-12-28_6d9e95ccd5039f49bcc88ea5379b4a29_hijackloader_jaff

    • Size

      20.5MB

    • MD5

      6d9e95ccd5039f49bcc88ea5379b4a29

    • SHA1

      0e83f707e4321179b608d5401450e45b3c844532

    • SHA256

      b1a450ab3ca2b38605981891257e7d37090c5578e71e046411a45c479c234264

    • SHA512

      cc0f73ea9b611763c688fa68e09725af55ffffdf6200f5ce8cef4588156630060517c607b7ee4fe27ad1be155e4af150c9cb97f140ff63009640a3a9fceda22a

    • SSDEEP

      196608:RFQWEPnPBnEXPEtFQWEPnPBnEXPETR8N3MKFBIHuM/B:PEPnPBnnEPnPBnHR8N3MKFBIOMJ

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (118) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks