General
-
Target
1e8928ea6af4934b80ca64777043889cdc090b71de7142ade558b82dabf32c14.exe
-
Size
110KB
-
Sample
241231-pb241ssjgr
-
MD5
7235214a4ce20d8de48cf433d90ae317
-
SHA1
824dac2ac953294e232b428c93da8788f0015ffb
-
SHA256
1e8928ea6af4934b80ca64777043889cdc090b71de7142ade558b82dabf32c14
-
SHA512
556202929691aa635642fe7b0dd00db81438a55dc57a9796bfc3c415b70c7bbfa0d93fda2a1d5046ebb758d23eff15438581651fb263734106e7c0e3609083e9
-
SSDEEP
1536:BLXB65939tY6HBg4sXJ1UviBhkohVKJjFhaLeT99+eLnV7UviBhkohVKJjFhvOcP:BLk395hYXJ1UvUWXsP2npUvUWX81U
Static task
static1
Behavioral task
behavioral1
Sample
1e8928ea6af4934b80ca64777043889cdc090b71de7142ade558b82dabf32c14.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
1e8928ea6af4934b80ca64777043889cdc090b71de7142ade558b82dabf32c14.exe
-
Size
110KB
-
MD5
7235214a4ce20d8de48cf433d90ae317
-
SHA1
824dac2ac953294e232b428c93da8788f0015ffb
-
SHA256
1e8928ea6af4934b80ca64777043889cdc090b71de7142ade558b82dabf32c14
-
SHA512
556202929691aa635642fe7b0dd00db81438a55dc57a9796bfc3c415b70c7bbfa0d93fda2a1d5046ebb758d23eff15438581651fb263734106e7c0e3609083e9
-
SSDEEP
1536:BLXB65939tY6HBg4sXJ1UviBhkohVKJjFhaLeT99+eLnV7UviBhkohVKJjFhvOcP:BLk395hYXJ1UvUWXsP2npUvUWX81U
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1