General

  • Target

    0bf84fa5ca26bb868aa488b77de00cbf.msi

  • Size

    264KB

  • Sample

    211119-gsmrnahcfk

  • MD5

    0bf84fa5ca26bb868aa488b77de00cbf

  • SHA1

    449b60c26cec7d4ef652a08475b97c60dae25d0b

  • SHA256

    d7cda98c0f58ed65cb617d58ce189f5df2bc839820bcb56cd4574a5e41c49118

  • SHA512

    755848935472e74d67d3f99c6172f0779ace1e85fb778824c8e7b9f8f5ec5c006e0509d39ab419dae61030ae2056f2675afc8c7ad666668ef56bff045df75a38

Malware Config

Extracted

Family

latam_generic_downloader

C2

https://mod.solidez.top/dlodri.zez

Targets

    • Target

      0bf84fa5ca26bb868aa488b77de00cbf.msi

    • Size

      264KB

    • MD5

      0bf84fa5ca26bb868aa488b77de00cbf

    • SHA1

      449b60c26cec7d4ef652a08475b97c60dae25d0b

    • SHA256

      d7cda98c0f58ed65cb617d58ce189f5df2bc839820bcb56cd4574a5e41c49118

    • SHA512

      755848935472e74d67d3f99c6172f0779ace1e85fb778824c8e7b9f8f5ec5c006e0509d39ab419dae61030ae2056f2675afc8c7ad666668ef56bff045df75a38

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks