General

  • Target

    5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839

  • Size

    3.5MB

  • Sample

    250318-yc91pa1ls7

  • MD5

    68cca8274a53918321b220e3b48251fe

  • SHA1

    2e4a0dcd41818d5e63dbeeebca62458f0cf79342

  • SHA256

    5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839

  • SHA512

    7f61bcd2aefd932b51db2996120e54ca7812f6041f27f73221565011f703550ae3936fe67ce6b3f54bcbe2612cf1e9d16cfc87e331ea5d5e97a58ea5da19a398

  • SSDEEP

    49152:ZgoRTtP4NngsOcwTwKZYqcPEFLVZtmoVDn99c1/0VX69Ux4CO3OnepMIAmZea+:SOA+wq3hZkuDnu0VX69UeCOq8AmZeR

Malware Config

Targets

    • Target

      5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839

    • Size

      3.5MB

    • MD5

      68cca8274a53918321b220e3b48251fe

    • SHA1

      2e4a0dcd41818d5e63dbeeebca62458f0cf79342

    • SHA256

      5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839

    • SHA512

      7f61bcd2aefd932b51db2996120e54ca7812f6041f27f73221565011f703550ae3936fe67ce6b3f54bcbe2612cf1e9d16cfc87e331ea5d5e97a58ea5da19a398

    • SSDEEP

      49152:ZgoRTtP4NngsOcwTwKZYqcPEFLVZtmoVDn99c1/0VX69Ux4CO3OnepMIAmZea+:SOA+wq3hZkuDnu0VX69UeCOq8AmZeR

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks