General
-
Target
39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64
-
Size
3.3MB
-
Sample
250101-1ts5lswpcs
-
MD5
04c990dd821659ae674224822402f3f5
-
SHA1
1ac8c862e30cfacce344e00ef21ee6c4517c215f
-
SHA256
39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64
-
SHA512
c3002405e1c360e4b7e11d31cdffe8a8bdfffe0f53a8ab431ee669aa509e1b210414c1d36ab4277959fdcbd27479cb59e980cb11547ea7684ae5fe4d267a24f0
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvZuV:RF8QUitE4iLqaPWGnEvcUkUt0
Static task
static1
Behavioral task
behavioral1
Sample
39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64
-
Size
3.3MB
-
MD5
04c990dd821659ae674224822402f3f5
-
SHA1
1ac8c862e30cfacce344e00ef21ee6c4517c215f
-
SHA256
39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64
-
SHA512
c3002405e1c360e4b7e11d31cdffe8a8bdfffe0f53a8ab431ee669aa509e1b210414c1d36ab4277959fdcbd27479cb59e980cb11547ea7684ae5fe4d267a24f0
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvZuV:RF8QUitE4iLqaPWGnEvcUkUt0
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (226) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-