General

  • Target

    minha.fatu812381239 t95wqzyg 84bp96.msi

  • Size

    3.9MB

  • Sample

    210302-71j85hflme

  • MD5

    9d4fe6049306aa6f4bbc0921333b2a46

  • SHA1

    19c9d4c33ec8960bfe151a39bcd81aa05a85c72b

  • SHA256

    6ff7459bb301103727dc8559a89ed94cc6f7a70ca14a39864e0e6ea8bc4a1484

  • SHA512

    5526da30f70f9af14a6b3b8d5503b16525f7df6eb94d7a1ba9cf0a3088ee15c563105591b52d2761fdf20072108f8f501b4073458045801bb2f4e54ef83a7730

Score
8/10
upx

Malware Config

Targets

    • Target

      minha.fatu812381239 t95wqzyg 84bp96.msi

    • Size

      3.9MB

    • MD5

      9d4fe6049306aa6f4bbc0921333b2a46

    • SHA1

      19c9d4c33ec8960bfe151a39bcd81aa05a85c72b

    • SHA256

      6ff7459bb301103727dc8559a89ed94cc6f7a70ca14a39864e0e6ea8bc4a1484

    • SHA512

      5526da30f70f9af14a6b3b8d5503b16525f7df6eb94d7a1ba9cf0a3088ee15c563105591b52d2761fdf20072108f8f501b4073458045801bb2f4e54ef83a7730

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks