General
-
Target
Java.msi
-
Size
4.3MB
-
Sample
210608-f3qabzp2la
-
MD5
65455fe14bb0f3baa9d43c4cf2b421f7
-
SHA1
08ba1973c2ad37142163d0f3067d12d26cf5ad61
-
SHA256
0d245d45e6c96ffa4baf8b8be6cc7b0d15165b2398c420a9ad70788e7a1f88d7
-
SHA512
6fb0c692eed60957b5da7edb4eb60a1693a86491b7f512e341ede7db2571717aeea152fd01b37c092f7ef8bf8d77900d7269537e8b60c9d793e0c9ac70d99bab
Static task
static1
Behavioral task
behavioral1
Sample
Java.msi
Resource
win7v20210410
Malware Config
Targets
-
-
Target
Java.msi
-
Size
4.3MB
-
MD5
65455fe14bb0f3baa9d43c4cf2b421f7
-
SHA1
08ba1973c2ad37142163d0f3067d12d26cf5ad61
-
SHA256
0d245d45e6c96ffa4baf8b8be6cc7b0d15165b2398c420a9ad70788e7a1f88d7
-
SHA512
6fb0c692eed60957b5da7edb4eb60a1693a86491b7f512e341ede7db2571717aeea152fd01b37c092f7ef8bf8d77900d7269537e8b60c9d793e0c9ac70d99bab
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-