General
-
Target
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9
-
Size
3.1MB
-
Sample
250412-tv38msyjt8
-
MD5
2d9734caef2b9c85f766b5515ace678f
-
SHA1
e5fc3d7534b916672a6c3497b7a8d4bdfb02302f
-
SHA256
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9
-
SHA512
1b4c045eddf179a8a7cfa15d3671aaa9caec0902ae161d1403312c401d7f7473a32e90cb28bec4d67a589d8835689acb847427f28b1b7e69b10476a2e03e4a22
-
SSDEEP
49152:/uWJCbWi2qRTN6DtXrVr1u668B1ECYJgkVFLmX28xO5tL:/ugCSiD6ZXrVr1l68B+5JLFLm7xQtL
Static task
static1
Behavioral task
behavioral1
Sample
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe
Resource
win10v2004-20250410-en
Malware Config
Targets
-
-
Target
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9
-
Size
3.1MB
-
MD5
2d9734caef2b9c85f766b5515ace678f
-
SHA1
e5fc3d7534b916672a6c3497b7a8d4bdfb02302f
-
SHA256
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9
-
SHA512
1b4c045eddf179a8a7cfa15d3671aaa9caec0902ae161d1403312c401d7f7473a32e90cb28bec4d67a589d8835689acb847427f28b1b7e69b10476a2e03e4a22
-
SSDEEP
49152:/uWJCbWi2qRTN6DtXrVr1u668B1ECYJgkVFLmX28xO5tL:/ugCSiD6ZXrVr1l68B+5JLFLm7xQtL
Score10/10-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-