General

  • Target

    MouseSpeedSetup.exe

  • Size

    7.3MB

  • Sample

    250306-ydt1vswsfy

  • MD5

    0530d46a8be39eed7b0c613ab6182c82

  • SHA1

    9a567aa4df2644010a7c0d97244ccbdf2be62def

  • SHA256

    aaf0e30255217a22cc244a75919e99227d11f7e92b0f6e474e93fddc8a1f7142

  • SHA512

    ed2dcec32a611f278d787a22ddc7145a1086d91d106276236922928128398ba780cd3b0764508635d039c7a3e0900c4e8e791badcf1d95606eb0a89e3245c65c

  • SSDEEP

    98304:NkL4SowvA8okj4yklTsH3/CbmWLPcWqe3UnHzfJTwbESzfsYf6ugUM0NgkVxDl:+N9NDklTWWLUnTfbQi0Xvp

Malware Config

Targets

    • Target

      MouseSpeedSetup.exe

    • Size

      7.3MB

    • MD5

      0530d46a8be39eed7b0c613ab6182c82

    • SHA1

      9a567aa4df2644010a7c0d97244ccbdf2be62def

    • SHA256

      aaf0e30255217a22cc244a75919e99227d11f7e92b0f6e474e93fddc8a1f7142

    • SHA512

      ed2dcec32a611f278d787a22ddc7145a1086d91d106276236922928128398ba780cd3b0764508635d039c7a3e0900c4e8e791badcf1d95606eb0a89e3245c65c

    • SSDEEP

      98304:NkL4SowvA8okj4yklTsH3/CbmWLPcWqe3UnHzfJTwbESzfsYf6ugUM0NgkVxDl:+N9NDklTWWLUnTfbQi0Xvp

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks