General
-
Target
2654d2d35ce77f52a2f09784c124f924.msi
-
Size
264KB
-
Sample
211014-rkkmfahfh8
-
MD5
2654d2d35ce77f52a2f09784c124f924
-
SHA1
b52bd25fef4dfc4f79f63b45dcf52f9b41babc20
-
SHA256
60ca595c2e8c64cecf7c2f5e1bf9b6d8fa0ca96ba4003daf9681ede62244d35b
-
SHA512
639f306c360b334e56b04058bc1a9ee4ffa4ebc361d45486ba985b225d7d3c31929e51576765e897f20e8f34ff6b06172658e6e2ac7b13e31869987b6a169ad8
Behavioral task
behavioral1
Sample
2654d2d35ce77f52a2f09784c124f924.msi
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
2654d2d35ce77f52a2f09784c124f924.msi
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
2654d2d35ce77f52a2f09784c124f924.msi
-
Size
264KB
-
MD5
2654d2d35ce77f52a2f09784c124f924
-
SHA1
b52bd25fef4dfc4f79f63b45dcf52f9b41babc20
-
SHA256
60ca595c2e8c64cecf7c2f5e1bf9b6d8fa0ca96ba4003daf9681ede62244d35b
-
SHA512
639f306c360b334e56b04058bc1a9ee4ffa4ebc361d45486ba985b225d7d3c31929e51576765e897f20e8f34ff6b06172658e6e2ac7b13e31869987b6a169ad8
Score8/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-