General

  • Target

    36b8ab4ab974a6be2ae8aec49600215c.msi

  • Size

    264KB

  • Sample

    211019-f4wm9sfcc9

  • MD5

    36b8ab4ab974a6be2ae8aec49600215c

  • SHA1

    01233a85959dd6f5815eb8a037d630b81bff0eb0

  • SHA256

    17182f1f100e9370ee0798fdad75aca6c9004d9446bad85bf5ad9f28975f77d4

  • SHA512

    27bbfedd27c8b821fc17a25ab7a704874df02cb9f608bb02c0892e68e64336ff6816248f4fab150c11e8da7d8422195be7f50ac37927a5e2cef3d95cc71e9072

Malware Config

Extracted

Family

latam_generic_downloader

C2

https://privateincorpore.s3.sa-east-1.amazonaws.com/bihouti.tch

Targets

    • Target

      36b8ab4ab974a6be2ae8aec49600215c.msi

    • Size

      264KB

    • MD5

      36b8ab4ab974a6be2ae8aec49600215c

    • SHA1

      01233a85959dd6f5815eb8a037d630b81bff0eb0

    • SHA256

      17182f1f100e9370ee0798fdad75aca6c9004d9446bad85bf5ad9f28975f77d4

    • SHA512

      27bbfedd27c8b821fc17a25ab7a704874df02cb9f608bb02c0892e68e64336ff6816248f4fab150c11e8da7d8422195be7f50ac37927a5e2cef3d95cc71e9072

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks