General

  • Target

    d596262efab34d7f5a682e38ef17b92eb719b14e5f95215ba781d73ea57889e2

  • Size

    6.1MB

  • Sample

    240603-pqnvyaee5w

  • MD5

    e44f55a2d7aadbe34e7b10729f9cffb6

  • SHA1

    b8b26b6f74df9b668e06fdd2eb43b7ac455bda77

  • SHA256

    d596262efab34d7f5a682e38ef17b92eb719b14e5f95215ba781d73ea57889e2

  • SHA512

    e0e16b687fd83ab7de6c5f6cc96fbc88edc75faecd2686565573b48a650f9176320491c48ccc60ee4655278f6e6ae24a17565e3ef223a0f776db946662b794d8

  • SSDEEP

    98304:38Guubg9FJTeTdqHSzRmz1bOL+PnXcw799bYO8mMcuNFLOAkGkzdnEVomFHKnP:38GYfJT7PnswZF8vcuNFLOyomFHKnP

Malware Config

Targets

    • Target

      d596262efab34d7f5a682e38ef17b92eb719b14e5f95215ba781d73ea57889e2

    • Size

      6.1MB

    • MD5

      e44f55a2d7aadbe34e7b10729f9cffb6

    • SHA1

      b8b26b6f74df9b668e06fdd2eb43b7ac455bda77

    • SHA256

      d596262efab34d7f5a682e38ef17b92eb719b14e5f95215ba781d73ea57889e2

    • SHA512

      e0e16b687fd83ab7de6c5f6cc96fbc88edc75faecd2686565573b48a650f9176320491c48ccc60ee4655278f6e6ae24a17565e3ef223a0f776db946662b794d8

    • SSDEEP

      98304:38Guubg9FJTeTdqHSzRmz1bOL+PnXcw799bYO8mMcuNFLOAkGkzdnEVomFHKnP:38GYfJT7PnswZF8vcuNFLOyomFHKnP

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks