General

  • Target

    2025-01-27_a3815e633fbbf72f16ab9222cba0dcd8_hijackloader_mafia_magniber

  • Size

    2.7MB

  • Sample

    250127-lkkdsaskfy

  • MD5

    a3815e633fbbf72f16ab9222cba0dcd8

  • SHA1

    a5cbef62e49a9ceab2911c8a00dec46fe99e6f76

  • SHA256

    83d04fb274ff37f92d1b3af31a4ddde7738b74014fbbf4d94e1e00f6df122fdf

  • SHA512

    0d258d5acb4781d40e2c02a1e0c0a8acdba22aa1d7a711fe7dbb74efa0f5bc87c53f2e61cd57722544b57e8020809a561a82a96c87406f9794956e37d7e08c1c

  • SSDEEP

    49152:oZ4nCbJBwY3PMT9/ffQGda2TPeQ0q5VWy7EeN0LsdmYYwuTvwovF0ovF0ovF:tnCDwP3QGda2TPpPtQA0YgmuTLvFHvF9

Malware Config

Targets

    • Target

      2025-01-27_a3815e633fbbf72f16ab9222cba0dcd8_hijackloader_mafia_magniber

    • Size

      2.7MB

    • MD5

      a3815e633fbbf72f16ab9222cba0dcd8

    • SHA1

      a5cbef62e49a9ceab2911c8a00dec46fe99e6f76

    • SHA256

      83d04fb274ff37f92d1b3af31a4ddde7738b74014fbbf4d94e1e00f6df122fdf

    • SHA512

      0d258d5acb4781d40e2c02a1e0c0a8acdba22aa1d7a711fe7dbb74efa0f5bc87c53f2e61cd57722544b57e8020809a561a82a96c87406f9794956e37d7e08c1c

    • SSDEEP

      49152:oZ4nCbJBwY3PMT9/ffQGda2TPeQ0q5VWy7EeN0LsdmYYwuTvwovF0ovF0ovF:tnCDwP3QGda2TPpPtQA0YgmuTLvFHvF9

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks