General
-
Target
1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fdN.exe
-
Size
3.4MB
-
Sample
250104-gvkp3swlg1
-
MD5
4917f091e084dd76d27ffd7aebaeb0e0
-
SHA1
b97e9fb54bb60fea6e6b56d594fbaf0db7f02b55
-
SHA256
1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fd
-
SHA512
831168a9ba713051130caa779a9682443ed090be0f5cd8150be8b1e9ad6595e45b91060cb4a41e2cc5055362b04ab75b2b3c368b067951d5b13cb09946e0fbb9
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLZGqdIya:RF8QUitE4iLqaPWGnEvS9E6Iya
Static task
static1
Behavioral task
behavioral1
Sample
1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fdN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fdN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fdN.exe
-
Size
3.4MB
-
MD5
4917f091e084dd76d27ffd7aebaeb0e0
-
SHA1
b97e9fb54bb60fea6e6b56d594fbaf0db7f02b55
-
SHA256
1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fd
-
SHA512
831168a9ba713051130caa779a9682443ed090be0f5cd8150be8b1e9ad6595e45b91060cb4a41e2cc5055362b04ab75b2b3c368b067951d5b13cb09946e0fbb9
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLZGqdIya:RF8QUitE4iLqaPWGnEvS9E6Iya
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (141) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-