General
-
Target
5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839
-
Size
3.5MB
-
Sample
250318-yc91pa1ls7
-
MD5
68cca8274a53918321b220e3b48251fe
-
SHA1
2e4a0dcd41818d5e63dbeeebca62458f0cf79342
-
SHA256
5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839
-
SHA512
7f61bcd2aefd932b51db2996120e54ca7812f6041f27f73221565011f703550ae3936fe67ce6b3f54bcbe2612cf1e9d16cfc87e331ea5d5e97a58ea5da19a398
-
SSDEEP
49152:ZgoRTtP4NngsOcwTwKZYqcPEFLVZtmoVDn99c1/0VX69Ux4CO3OnepMIAmZea+:SOA+wq3hZkuDnu0VX69UeCOq8AmZeR
Static task
static1
Behavioral task
behavioral1
Sample
5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839.dll
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839
-
Size
3.5MB
-
MD5
68cca8274a53918321b220e3b48251fe
-
SHA1
2e4a0dcd41818d5e63dbeeebca62458f0cf79342
-
SHA256
5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839
-
SHA512
7f61bcd2aefd932b51db2996120e54ca7812f6041f27f73221565011f703550ae3936fe67ce6b3f54bcbe2612cf1e9d16cfc87e331ea5d5e97a58ea5da19a398
-
SSDEEP
49152:ZgoRTtP4NngsOcwTwKZYqcPEFLVZtmoVDn99c1/0VX69Ux4CO3OnepMIAmZea+:SOA+wq3hZkuDnu0VX69UeCOq8AmZeR
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-