General

  • Target

    ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe

  • Size

    3.1MB

  • Sample

    250103-rbh29azrdr

  • MD5

    51689aa36665dae2c30193725ab9e3c0

  • SHA1

    d9820f5f8ca72c7a887b6290d41596c1a30a79a0

  • SHA256

    ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7

  • SHA512

    5c8dee0fc069747b3781304888ab094b0db52b042ca847b0ead6177ad1141bb25036b9c6f0a92a701c8c788aea11cf3891f855ddcdc4f519146204ecff64e4f1

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgompnfMNJO:RF8QUitE4iLqaPWGnEvK7RCO

Malware Config

Targets

    • Target

      ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7N.exe

    • Size

      3.1MB

    • MD5

      51689aa36665dae2c30193725ab9e3c0

    • SHA1

      d9820f5f8ca72c7a887b6290d41596c1a30a79a0

    • SHA256

      ad5abae92c52f988a942ad0c899d37e08bf289da54461e0772a2d02dc98665e7

    • SHA512

      5c8dee0fc069747b3781304888ab094b0db52b042ca847b0ead6177ad1141bb25036b9c6f0a92a701c8c788aea11cf3891f855ddcdc4f519146204ecff64e4f1

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgompnfMNJO:RF8QUitE4iLqaPWGnEvK7RCO

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (214) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks