General
-
Target
f65ce67fc6ffa29fb78fc9769690e32c6feffcd49755a7727c62c3d6d78c90ebN.exe
-
Size
2.8MB
-
Sample
250104-mm9bcsvrft
-
MD5
7d482819b5c544a401b3d655211ae590
-
SHA1
a64019d6226fc67d816e45f50d08989207300fd3
-
SHA256
f65ce67fc6ffa29fb78fc9769690e32c6feffcd49755a7727c62c3d6d78c90eb
-
SHA512
ec36cee9a0aa191827ee6785699d3c9110947a7bba66c36f5ecdf867180139af88be72457b5be2ff2f65612c53833bbca2b8d8bcc7020ae439d77ecbb7824145
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMmC:RF8QUitE4iLqaPWGnEvgM7Mf
Static task
static1
Behavioral task
behavioral1
Sample
f65ce67fc6ffa29fb78fc9769690e32c6feffcd49755a7727c62c3d6d78c90ebN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f65ce67fc6ffa29fb78fc9769690e32c6feffcd49755a7727c62c3d6d78c90ebN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f65ce67fc6ffa29fb78fc9769690e32c6feffcd49755a7727c62c3d6d78c90ebN.exe
-
Size
2.8MB
-
MD5
7d482819b5c544a401b3d655211ae590
-
SHA1
a64019d6226fc67d816e45f50d08989207300fd3
-
SHA256
f65ce67fc6ffa29fb78fc9769690e32c6feffcd49755a7727c62c3d6d78c90eb
-
SHA512
ec36cee9a0aa191827ee6785699d3c9110947a7bba66c36f5ecdf867180139af88be72457b5be2ff2f65612c53833bbca2b8d8bcc7020ae439d77ecbb7824145
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMmC:RF8QUitE4iLqaPWGnEvgM7Mf
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (224) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-