General
-
Target
d392d9bfb7046189dc7bd9783a1602ae.msi
-
Size
264KB
-
Sample
211014-whfb6aaah5
-
MD5
d392d9bfb7046189dc7bd9783a1602ae
-
SHA1
884ebbad69a4d9e3ce5973514c5c6d77f4d672a4
-
SHA256
cf3537f8d24f8b59848c996f0fb94fd8f81bebd4a9baa8e1922f635eadc2d33e
-
SHA512
fb3d8166ce2f4f0a54b4b87922a75c693694309062eb17eed2ed2d03e052e2517c77231f18199bfa5d3f1f5d36a4aedf2d0696c913bdf4b60256cf529237ee86
Behavioral task
behavioral1
Sample
d392d9bfb7046189dc7bd9783a1602ae.msi
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
d392d9bfb7046189dc7bd9783a1602ae.msi
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
d392d9bfb7046189dc7bd9783a1602ae.msi
-
Size
264KB
-
MD5
d392d9bfb7046189dc7bd9783a1602ae
-
SHA1
884ebbad69a4d9e3ce5973514c5c6d77f4d672a4
-
SHA256
cf3537f8d24f8b59848c996f0fb94fd8f81bebd4a9baa8e1922f635eadc2d33e
-
SHA512
fb3d8166ce2f4f0a54b4b87922a75c693694309062eb17eed2ed2d03e052e2517c77231f18199bfa5d3f1f5d36a4aedf2d0696c913bdf4b60256cf529237ee86
Score8/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-