General

  • Target

    Proc.Eeletronicoyilg1707 03r9th.msi

  • Size

    4.0MB

  • Sample

    211123-te3xyaafak

  • MD5

    c937a24384d2a4117ba1edaf5bae2f63

  • SHA1

    e413d38000e5e0a7b3998e20fb1623fe149ba5e3

  • SHA256

    1d7cec07e9cffe08e3b79cc38e0f0e59720934a456657dcc994256b88e43dab0

  • SHA512

    5e2390e8c7c4a0b2a5e57eb3832a6265e145dee0079c82d210604ff1f045cf98e2f7c6124fd26736a3fe4a39291cb004adcba2da9b8c35306401a622f1d90150

Malware Config

Extracted

Family

latam_generic_downloader

C2

https://jridicaopyxxxqrcgold.com/M1/ABGSGDEY4754657588V.zip

Targets

    • Target

      Proc.Eeletronicoyilg1707 03r9th.msi

    • Size

      4.0MB

    • MD5

      c937a24384d2a4117ba1edaf5bae2f63

    • SHA1

      e413d38000e5e0a7b3998e20fb1623fe149ba5e3

    • SHA256

      1d7cec07e9cffe08e3b79cc38e0f0e59720934a456657dcc994256b88e43dab0

    • SHA512

      5e2390e8c7c4a0b2a5e57eb3832a6265e145dee0079c82d210604ff1f045cf98e2f7c6124fd26736a3fe4a39291cb004adcba2da9b8c35306401a622f1d90150

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks