General

  • Target

    2025-02-13_650181ce9cde52bb88bfe7daa9e9a4bb_mafia

  • Size

    2.3MB

  • Sample

    250213-3r7akaxlcp

  • MD5

    650181ce9cde52bb88bfe7daa9e9a4bb

  • SHA1

    ace711594336ff15819bca2fe5b1b0d5f253058a

  • SHA256

    5803d1da3820714c123d1bcbbb97fc8866fd073473531e75a0f05d68d49604c8

  • SHA512

    1327cd789c145432a4076371451f665ee5d071f63d84b2baee9b506c34eb3a6184010c79806e4d3f13db748b93782fcba48d595624420ea07d68ea0c4811e91b

  • SSDEEP

    49152:6OIq2/Om3iBTnTS/sWn3cvvB68B1ECYJgkUzgaAmZea+:6Oh22mqTQsWn3cvp68B+5JA3AmZeR

Malware Config

Targets

    • Target

      2025-02-13_650181ce9cde52bb88bfe7daa9e9a4bb_mafia

    • Size

      2.3MB

    • MD5

      650181ce9cde52bb88bfe7daa9e9a4bb

    • SHA1

      ace711594336ff15819bca2fe5b1b0d5f253058a

    • SHA256

      5803d1da3820714c123d1bcbbb97fc8866fd073473531e75a0f05d68d49604c8

    • SHA512

      1327cd789c145432a4076371451f665ee5d071f63d84b2baee9b506c34eb3a6184010c79806e4d3f13db748b93782fcba48d595624420ea07d68ea0c4811e91b

    • SSDEEP

      49152:6OIq2/Om3iBTnTS/sWn3cvvB68B1ECYJgkUzgaAmZea+:6Oh22mqTQsWn3cvp68B+5JA3AmZeR

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks