General
-
Target
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
-
Size
3.1MB
-
Sample
250103-rbh29azrdr
-
MD5
51689aa36665dae2c30193725ab9e3c0
-
SHA1
d9820f5f8ca72c7a887b6290d41596c1a30a79a0
-
SHA256
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7
-
SHA512
5c8dee0fc069747b3781304888ab094b0db52b042ca847b0ead6177ad1141bb25036b9c6f0a92a701c8c788aea11cf3891f855ddcdc4f519146204ecff64e4f1
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgompnfMNJO:RF8QUitE4iLqaPWGnEvK7RCO
Static task
static1
Behavioral task
behavioral1
Sample
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe
-
Size
3.1MB
-
MD5
51689aa36665dae2c30193725ab9e3c0
-
SHA1
d9820f5f8ca72c7a887b6290d41596c1a30a79a0
-
SHA256
ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7
-
SHA512
5c8dee0fc069747b3781304888ab094b0db52b042ca847b0ead6177ad1141bb25036b9c6f0a92a701c8c788aea11cf3891f855ddcdc4f519146204ecff64e4f1
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgompnfMNJO:RF8QUitE4iLqaPWGnEvK7RCO
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (214) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-