General
-
Target
64f49c4b8aa5d2eb408b10774eff3df4386b824fee1301dbad6a5d982443613a
-
Size
6.1MB
-
Sample
250412-twb6jsyta1
-
MD5
9814fd49bb2677f629a804077726cbe4
-
SHA1
6986b01157be4c693c969fc22feeec0cb4d1cfc4
-
SHA256
64f49c4b8aa5d2eb408b10774eff3df4386b824fee1301dbad6a5d982443613a
-
SHA512
b0dc8db8fb4922f68c8e9031dad1636663b47243b40749e2b3fc6659bfe998a6a821ba660b706e197d6f87d17e76349d0e4be88dbc34bf340559721d7d278503
-
SSDEEP
98304:FAA+ssCrSVuDnu0VXq2RzR8IRIGyB4zQqwJBxQtPm:2A+4JDfBq3SIGrEqmBxoPm
Static task
static1
Behavioral task
behavioral1
Sample
64f49c4b8aa5d2eb408b10774eff3df4386b824fee1301dbad6a5d982443613a.dll
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
64f49c4b8aa5d2eb408b10774eff3df4386b824fee1301dbad6a5d982443613a
-
Size
6.1MB
-
MD5
9814fd49bb2677f629a804077726cbe4
-
SHA1
6986b01157be4c693c969fc22feeec0cb4d1cfc4
-
SHA256
64f49c4b8aa5d2eb408b10774eff3df4386b824fee1301dbad6a5d982443613a
-
SHA512
b0dc8db8fb4922f68c8e9031dad1636663b47243b40749e2b3fc6659bfe998a6a821ba660b706e197d6f87d17e76349d0e4be88dbc34bf340559721d7d278503
-
SSDEEP
98304:FAA+ssCrSVuDnu0VXq2RzR8IRIGyB4zQqwJBxQtPm:2A+4JDfBq3SIGrEqmBxoPm
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-