General

  • Target

    2024-06-12_57490eb9a715f68ea6f52182b3e639cf_magniber

  • Size

    7.1MB

  • Sample

    240612-rf6zwa1fpp

  • MD5

    57490eb9a715f68ea6f52182b3e639cf

  • SHA1

    2a24774e517008a6d6c38ec5ae6f056fe2fb058b

  • SHA256

    ea5528aea2e54d6721ed0f33cf6a7cb5c4e55ddc6ff6401ae0ec1dfb96156195

  • SHA512

    9f863c51dbb2402912952b2788ea51f78cf86b4d9befc467875542696560a401594c1fbdaa0a64d5b2df065eabc9c4838443ca6d5ac7261f069865f3626ca08c

  • SSDEEP

    196608:wqI5M3JN+tVrtF8ETq8RUzPGtPIyZRA54lzU:wqI5+JNEVrtFQ8yzPGtPIyZA4VU

Malware Config

Targets

    • Target

      2024-06-12_57490eb9a715f68ea6f52182b3e639cf_magniber

    • Size

      7.1MB

    • MD5

      57490eb9a715f68ea6f52182b3e639cf

    • SHA1

      2a24774e517008a6d6c38ec5ae6f056fe2fb058b

    • SHA256

      ea5528aea2e54d6721ed0f33cf6a7cb5c4e55ddc6ff6401ae0ec1dfb96156195

    • SHA512

      9f863c51dbb2402912952b2788ea51f78cf86b4d9befc467875542696560a401594c1fbdaa0a64d5b2df065eabc9c4838443ca6d5ac7261f069865f3626ca08c

    • SSDEEP

      196608:wqI5M3JN+tVrtF8ETq8RUzPGtPIyZRA54lzU:wqI5+JNEVrtFQ8yzPGtPIyZA4VU

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • UPX dump on OEP (original entry point)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks