General

  • Target

    2024070245f8192ee22dcade6d9a5611b4c72ae3magniber

  • Size

    4.5MB

  • Sample

    240702-jkv46swgkn

  • MD5

    45f8192ee22dcade6d9a5611b4c72ae3

  • SHA1

    ac840f8b54d9b171654dafd9a6dd59228bb0c1da

  • SHA256

    b41967a2959babaff6ce13025f0a110665457dfb6450109af190abf33444bf68

  • SHA512

    3fdf564af0000cb4fe40348e067f86321139fc4d7182d8d878f62a8152e10d585e42e3a52847a9b11d238a36bb745aac03ba5d5503964068141c8f7d0e250bd8

  • SSDEEP

    98304:UB7HjhbIy9BU8djoD+lCnUOOOPRKzsTNyCXauK871oMHfA:UB7Hdxo66OIEsTmoZowo

Malware Config

Targets

    • Target

      2024070245f8192ee22dcade6d9a5611b4c72ae3magniber

    • Size

      4.5MB

    • MD5

      45f8192ee22dcade6d9a5611b4c72ae3

    • SHA1

      ac840f8b54d9b171654dafd9a6dd59228bb0c1da

    • SHA256

      b41967a2959babaff6ce13025f0a110665457dfb6450109af190abf33444bf68

    • SHA512

      3fdf564af0000cb4fe40348e067f86321139fc4d7182d8d878f62a8152e10d585e42e3a52847a9b11d238a36bb745aac03ba5d5503964068141c8f7d0e250bd8

    • SSDEEP

      98304:UB7HjhbIy9BU8djoD+lCnUOOOPRKzsTNyCXauK871oMHfA:UB7Hdxo66OIEsTmoZowo

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks