General

  • Target

    FORM_PIX XJTVCZG.msi

  • Size

    953KB

  • Sample

    211025-kh522afhe8

  • MD5

    f2836216ca554dfdc8a300decb644911

  • SHA1

    338829d2c88f430b0d00bfb03ad8a43649b4e1d8

  • SHA256

    951c2f341e914601140aa9ead05895f6957d5cbfda80b81be99015d2be02d44f

  • SHA512

    02148775c5db048566d0fb73e7d8da06597362a31934907ce356238bc1aa8ab4b319094d16d2a5881bf9b6797fde023c42a76846448a5436f4b72f067a668b1c

Malware Config

Extracted

Family

latam_generic_downloader

C2

https://759c87514850247c.s3.us-east-2.amazonaws.com/0321F9132EC97FDC5EE532FF.zip

Targets

    • Target

      FORM_PIX XJTVCZG.msi

    • Size

      953KB

    • MD5

      f2836216ca554dfdc8a300decb644911

    • SHA1

      338829d2c88f430b0d00bfb03ad8a43649b4e1d8

    • SHA256

      951c2f341e914601140aa9ead05895f6957d5cbfda80b81be99015d2be02d44f

    • SHA512

      02148775c5db048566d0fb73e7d8da06597362a31934907ce356238bc1aa8ab4b319094d16d2a5881bf9b6797fde023c42a76846448a5436f4b72f067a668b1c

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks