General

  • Target

    3f775c6f5bf0d483ffb26584b713430399f8385551368575b58df4d9432a600c

  • Size

    2.9MB

  • Sample

    250101-15r2paxmay

  • MD5

    3b21836504ac26475c27dd76548b5d5c

  • SHA1

    07512f4447927ed8b62ba59ca02edb773a83e885

  • SHA256

    3f775c6f5bf0d483ffb26584b713430399f8385551368575b58df4d9432a600c

  • SHA512

    16ca7b7636ce6ea989da678231e0487a4a4f782f92d127cad961d8e876a30d7451679a5117083ff5f3075cdef2632b72aba5eec440460bb8b7d203d61f94a92f

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMmFJIU1:RF8QUitE4iLqaPWGnEvgM7ME

Malware Config

Targets

    • Target

      3f775c6f5bf0d483ffb26584b713430399f8385551368575b58df4d9432a600c

    • Size

      2.9MB

    • MD5

      3b21836504ac26475c27dd76548b5d5c

    • SHA1

      07512f4447927ed8b62ba59ca02edb773a83e885

    • SHA256

      3f775c6f5bf0d483ffb26584b713430399f8385551368575b58df4d9432a600c

    • SHA512

      16ca7b7636ce6ea989da678231e0487a4a4f782f92d127cad961d8e876a30d7451679a5117083ff5f3075cdef2632b72aba5eec440460bb8b7d203d61f94a92f

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMmFJIU1:RF8QUitE4iLqaPWGnEvgM7ME

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (227) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks