General

  • Target

    F902579284T582I9548S97.msi

  • Size

    12.4MB

  • Sample

    210722-l6pjrq3j9j

  • MD5

    f6578f0c82d9e050e645bc1efc5e9b08

  • SHA1

    fd2aaa5427bfbd18ff78c11d693cc30620587647

  • SHA256

    1af0c40046776a366da731da0249023c2814a94fdb252a5c727c43bd3baa6844

  • SHA512

    48e89a29acf0e3d1dba1b2727ee2d029de8387ea1a80deaf78c2a47bf6e829622d2c2a4fa144097c4316ac91471be82690592976fe960f5702d416b975dac3a1

Score
8/10

Malware Config

Targets

    • Target

      F902579284T582I9548S97.msi

    • Size

      12.4MB

    • MD5

      f6578f0c82d9e050e645bc1efc5e9b08

    • SHA1

      fd2aaa5427bfbd18ff78c11d693cc30620587647

    • SHA256

      1af0c40046776a366da731da0249023c2814a94fdb252a5c727c43bd3baa6844

    • SHA512

      48e89a29acf0e3d1dba1b2727ee2d029de8387ea1a80deaf78c2a47bf6e829622d2c2a4fa144097c4316ac91471be82690592976fe960f5702d416b975dac3a1

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks