General
-
Target
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
-
Size
2.8MB
-
Sample
250104-hxsn5sylcs
-
MD5
bee59f0c7a37f46356664b993b29c700
-
SHA1
eb702c3a42915c691652f115683a5fb2ff3981b9
-
SHA256
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3
-
SHA512
6df706ddccea6c35e7b91c57e632dc84cd91cceb8efde2baa7813576305088026459209ebcf0a5c999b731ccf9a14ec520e6a425c43d5e75ab60eb6ba0391174
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVzY+UOlk0l:RF8QUitE4iLqaPWGnEv3l
Static task
static1
Behavioral task
behavioral1
Sample
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
-
Size
2.8MB
-
MD5
bee59f0c7a37f46356664b993b29c700
-
SHA1
eb702c3a42915c691652f115683a5fb2ff3981b9
-
SHA256
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3
-
SHA512
6df706ddccea6c35e7b91c57e632dc84cd91cceb8efde2baa7813576305088026459209ebcf0a5c999b731ccf9a14ec520e6a425c43d5e75ab60eb6ba0391174
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVzY+UOlk0l:RF8QUitE4iLqaPWGnEv3l
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (222) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-