General

  • Target

    39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64

  • Size

    3.3MB

  • Sample

    250101-1ts5lswpcs

  • MD5

    04c990dd821659ae674224822402f3f5

  • SHA1

    1ac8c862e30cfacce344e00ef21ee6c4517c215f

  • SHA256

    39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64

  • SHA512

    c3002405e1c360e4b7e11d31cdffe8a8bdfffe0f53a8ab431ee669aa509e1b210414c1d36ab4277959fdcbd27479cb59e980cb11547ea7684ae5fe4d267a24f0

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvZuV:RF8QUitE4iLqaPWGnEvcUkUt0

Malware Config

Targets

    • Target

      39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64

    • Size

      3.3MB

    • MD5

      04c990dd821659ae674224822402f3f5

    • SHA1

      1ac8c862e30cfacce344e00ef21ee6c4517c215f

    • SHA256

      39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64

    • SHA512

      c3002405e1c360e4b7e11d31cdffe8a8bdfffe0f53a8ab431ee669aa509e1b210414c1d36ab4277959fdcbd27479cb59e980cb11547ea7684ae5fe4d267a24f0

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvZuV:RF8QUitE4iLqaPWGnEvcUkUt0

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (226) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks