General
-
Target
938b2e065955369403bd5ed78c063b44
-
Size
4.3MB
-
Sample
210624-cedwdgmhee
-
MD5
938b2e065955369403bd5ed78c063b44
-
SHA1
1e98ff12a5f4a390bbceae538e1177a65ad52dad
-
SHA256
02f79fab5c5cec65fcbd8ad039537afbe7badc815d55e63d031ae527f4a7bbd5
-
SHA512
159eccba99a0eefbaf078561527bae998202e893724205e0350f20e1c7fd09ccebcc757b433765d223bfcad650f91870e7e2b29031868112636f4061aa0afeb3
Static task
static1
Behavioral task
behavioral1
Sample
938b2e065955369403bd5ed78c063b44.msi
Resource
win7v20210410
Malware Config
Targets
-
-
Target
938b2e065955369403bd5ed78c063b44
-
Size
4.3MB
-
MD5
938b2e065955369403bd5ed78c063b44
-
SHA1
1e98ff12a5f4a390bbceae538e1177a65ad52dad
-
SHA256
02f79fab5c5cec65fcbd8ad039537afbe7badc815d55e63d031ae527f4a7bbd5
-
SHA512
159eccba99a0eefbaf078561527bae998202e893724205e0350f20e1c7fd09ccebcc757b433765d223bfcad650f91870e7e2b29031868112636f4061aa0afeb3
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-