General
-
Target
load.msi
-
Size
548KB
-
Sample
211004-wek38sghaq
-
MD5
13173913da1f35728d84e78a3de983c9
-
SHA1
9a1437af2d653fc265472a47edab9f22d49b1941
-
SHA256
0e6451e1f0eadb89390f4360e2a49a2ffb66e92e8b3ae75400095e75f4dd6abb
-
SHA512
3627ec46eb5b8cbdfd28015b38de6cd2279ff15be67e1a5d0c58a86fc1c165a39f4dd2d664977f7ce8a4ded9d2d678ce09c6fa3962e1b93f8543049313527a52
Static task
static1
Behavioral task
behavioral1
Sample
load.msi
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
load.msi
Resource
win10v20210408
Malware Config
Targets
-
-
Target
load.msi
-
Size
548KB
-
MD5
13173913da1f35728d84e78a3de983c9
-
SHA1
9a1437af2d653fc265472a47edab9f22d49b1941
-
SHA256
0e6451e1f0eadb89390f4360e2a49a2ffb66e92e8b3ae75400095e75f4dd6abb
-
SHA512
3627ec46eb5b8cbdfd28015b38de6cd2279ff15be67e1a5d0c58a86fc1c165a39f4dd2d664977f7ce8a4ded9d2d678ce09c6fa3962e1b93f8543049313527a52
Score10/10-
suricata: ET MALWARE MirrorBlast CnC Activity M2
suricata: ET MALWARE MirrorBlast CnC Activity M2
-
suricata: ET MALWARE MirrorBlast CnC Activity M3
suricata: ET MALWARE MirrorBlast CnC Activity M3
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-