General
-
Target
MSI83C2.tmp.zip
-
Size
150KB
-
Sample
210709-d342knz1ja
-
MD5
10068b6fc7134a0429c1fd008b7df02e
-
SHA1
93c8246ed8a14134e2d4d56459bee5efee9f160b
-
SHA256
08019862e614221ef8f0d298e0f6c109e9bbd89c23038de4c246dc7e72da7466
-
SHA512
9a45e928f435c666f3ec399d0f3f34f86bc3525f7259ab8eb021fa515c0bea9088a4c31b00e13c7e53004e0b78b86b350fa6223e468854693fd1a4ee5ff09642
Behavioral task
behavioral1
Sample
MSI83C2.tmp.msi
Resource
win7v20210410
Behavioral task
behavioral2
Sample
MSI83C2.tmp.msi
Resource
win10v20210410
Malware Config
Targets
-
-
Target
MSI83C2.tmp
-
Size
272KB
-
MD5
6ae9e28f2ca9921366ca1a43204d8f19
-
SHA1
41f536e77a89fc0b80d15d21e2b33d90b3cd116e
-
SHA256
f11008dbe739711a862cc2f3f6ed3f8e2629af80fe3f12feb22173f41de31325
-
SHA512
8cf83c9843cf9ef59a172f204e1782d99469c9fd6f0219b6cda75bc8a36deb575eb41877b7dc224566ccdf0fa6a621717cb612fd5f9897ee2a6166c79c16b66b
Score8/10-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-