General

  • Target

    f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe

  • Size

    2.8MB

  • Sample

    250104-hxsn5sylcs

  • MD5

    bee59f0c7a37f46356664b993b29c700

  • SHA1

    eb702c3a42915c691652f115683a5fb2ff3981b9

  • SHA256

    f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3

  • SHA512

    6df706ddccea6c35e7b91c57e632dc84cd91cceb8efde2baa7813576305088026459209ebcf0a5c999b731ccf9a14ec520e6a425c43d5e75ab60eb6ba0391174

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVzY+UOlk0l:RF8QUitE4iLqaPWGnEv3l

Malware Config

Targets

    • Target

      f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe

    • Size

      2.8MB

    • MD5

      bee59f0c7a37f46356664b993b29c700

    • SHA1

      eb702c3a42915c691652f115683a5fb2ff3981b9

    • SHA256

      f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3

    • SHA512

      6df706ddccea6c35e7b91c57e632dc84cd91cceb8efde2baa7813576305088026459209ebcf0a5c999b731ccf9a14ec520e6a425c43d5e75ab60eb6ba0391174

    • SSDEEP

      49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVzY+UOlk0l:RF8QUitE4iLqaPWGnEv3l

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (222) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks