General

  • Target

    d658fc04f5eb9b2f7984579d4b8d8322.msi

  • Size

    264KB

  • Sample

    211015-pg7lpabfap

  • MD5

    d658fc04f5eb9b2f7984579d4b8d8322

  • SHA1

    905e42f62ce86570abd70081185c969574fe64ed

  • SHA256

    472e40357bbd9c18824abf10157d6482b8d853cdef7267b723e5d887b54e00ee

  • SHA512

    3242e71dd101cbbc54e0136922424f4faf64bdcee2e37adde5ec9247bab30b5c5fcc611c26e9a2816ce56adbb44d4b707363ddbf8f7852563aa308690b9c1adb

Score
8/10

Malware Config

Targets

    • Target

      d658fc04f5eb9b2f7984579d4b8d8322.msi

    • Size

      264KB

    • MD5

      d658fc04f5eb9b2f7984579d4b8d8322

    • SHA1

      905e42f62ce86570abd70081185c969574fe64ed

    • SHA256

      472e40357bbd9c18824abf10157d6482b8d853cdef7267b723e5d887b54e00ee

    • SHA512

      3242e71dd101cbbc54e0136922424f4faf64bdcee2e37adde5ec9247bab30b5c5fcc611c26e9a2816ce56adbb44d4b707363ddbf8f7852563aa308690b9c1adb

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks