General

  • Target

    1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fdN.exe

  • Size

    3.4MB

  • Sample

    250104-gvkp3swlg1

  • MD5

    4917f091e084dd76d27ffd7aebaeb0e0

  • SHA1

    b97e9fb54bb60fea6e6b56d594fbaf0db7f02b55

  • SHA256

    1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fd

  • SHA512

    831168a9ba713051130caa779a9682443ed090be0f5cd8150be8b1e9ad6595e45b91060cb4a41e2cc5055362b04ab75b2b3c368b067951d5b13cb09946e0fbb9

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLZGqdIya:RF8QUitE4iLqaPWGnEvS9E6Iya

Malware Config

Targets

    • Target

      1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fdN.exe

    • Size

      3.4MB

    • MD5

      4917f091e084dd76d27ffd7aebaeb0e0

    • SHA1

      b97e9fb54bb60fea6e6b56d594fbaf0db7f02b55

    • SHA256

      1ebabb7de83b022004f8db77718d207646afe5f8aa0d969afb9beffac152d3fd

    • SHA512

      831168a9ba713051130caa779a9682443ed090be0f5cd8150be8b1e9ad6595e45b91060cb4a41e2cc5055362b04ab75b2b3c368b067951d5b13cb09946e0fbb9

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV8u/kUHHkLZGqdIya:RF8QUitE4iLqaPWGnEvS9E6Iya

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (141) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks