General

  • Target

    2024-06-21_4e2fc213efce57c2ec3140a7538654a2_magniber

  • Size

    5.1MB

  • Sample

    240621-b7k9gszanr

  • MD5

    4e2fc213efce57c2ec3140a7538654a2

  • SHA1

    d083cd576496ac116500fc9d3a39c49ba81a40a9

  • SHA256

    7a40b3b4d0cde6cd59429e682829e840d0552cccfe11a5d96b06ee4e3613ee93

  • SHA512

    c8f48d661fd8d8b2ff1452f1b717f8b36e7642d610b0460d118270229013523604698007b17a3b8cfdb6b10efadde50bc12d3371717a3bcc21966187b89cf439

  • SSDEEP

    98304:YMOEfW6lT0EhQRmoHCBCo9lvn6JuPgF42Dei0sgsqIgTy:YMO0nlT0EhGiBCo6Su4ujnD

Malware Config

Targets

    • Target

      2024-06-21_4e2fc213efce57c2ec3140a7538654a2_magniber

    • Size

      5.1MB

    • MD5

      4e2fc213efce57c2ec3140a7538654a2

    • SHA1

      d083cd576496ac116500fc9d3a39c49ba81a40a9

    • SHA256

      7a40b3b4d0cde6cd59429e682829e840d0552cccfe11a5d96b06ee4e3613ee93

    • SHA512

      c8f48d661fd8d8b2ff1452f1b717f8b36e7642d610b0460d118270229013523604698007b17a3b8cfdb6b10efadde50bc12d3371717a3bcc21966187b89cf439

    • SSDEEP

      98304:YMOEfW6lT0EhQRmoHCBCo9lvn6JuPgF42Dei0sgsqIgTy:YMO0nlT0EhGiBCo6Su4ujnD

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks