General
-
Target
bc6876b82828ba27684e93ae38e6d84148f0a384de8a654daf9e66aabeca9153N.exe
-
Size
3.7MB
-
Sample
250108-qbzjka1kaw
-
MD5
bb2e183b52db0d0b2227933d528939f0
-
SHA1
462af6192119775aa49bffe64d0e7bb25899bb11
-
SHA256
bc6876b82828ba27684e93ae38e6d84148f0a384de8a654daf9e66aabeca9153
-
SHA512
95dbd8fb856a0dfbd3d77adc7b7e9e890cc85700bbf5aa3187a65bb2032d35831310069d4753aaca8d523e06e21a686eb344908f5651c4cffe4dcd898166294b
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oS:RFQWEPnPBnEX2
Static task
static1
Behavioral task
behavioral1
Sample
bc6876b82828ba27684e93ae38e6d84148f0a384de8a654daf9e66aabeca9153N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc6876b82828ba27684e93ae38e6d84148f0a384de8a654daf9e66aabeca9153N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bc6876b82828ba27684e93ae38e6d84148f0a384de8a654daf9e66aabeca9153N.exe
-
Size
3.7MB
-
MD5
bb2e183b52db0d0b2227933d528939f0
-
SHA1
462af6192119775aa49bffe64d0e7bb25899bb11
-
SHA256
bc6876b82828ba27684e93ae38e6d84148f0a384de8a654daf9e66aabeca9153
-
SHA512
95dbd8fb856a0dfbd3d77adc7b7e9e890cc85700bbf5aa3187a65bb2032d35831310069d4753aaca8d523e06e21a686eb344908f5651c4cffe4dcd898166294b
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oS:RFQWEPnPBnEX2
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (196) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-