General
-
Target
Proc.Eeletronicoyilg1707 03r9th.msi
-
Size
4.0MB
-
Sample
211123-te3xyaafak
-
MD5
c937a24384d2a4117ba1edaf5bae2f63
-
SHA1
e413d38000e5e0a7b3998e20fb1623fe149ba5e3
-
SHA256
1d7cec07e9cffe08e3b79cc38e0f0e59720934a456657dcc994256b88e43dab0
-
SHA512
5e2390e8c7c4a0b2a5e57eb3832a6265e145dee0079c82d210604ff1f045cf98e2f7c6124fd26736a3fe4a39291cb004adcba2da9b8c35306401a622f1d90150
Static task
static1
Behavioral task
behavioral1
Sample
Proc.Eeletronicoyilg1707 03r9th.msi
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
Proc.Eeletronicoyilg1707 03r9th.msi
Resource
win10-en-20211104
Malware Config
Extracted
latam_generic_downloader
https://jridicaopyxxxqrcgold.com/M1/ABGSGDEY4754657588V.zip
Targets
-
-
Target
Proc.Eeletronicoyilg1707 03r9th.msi
-
Size
4.0MB
-
MD5
c937a24384d2a4117ba1edaf5bae2f63
-
SHA1
e413d38000e5e0a7b3998e20fb1623fe149ba5e3
-
SHA256
1d7cec07e9cffe08e3b79cc38e0f0e59720934a456657dcc994256b88e43dab0
-
SHA512
5e2390e8c7c4a0b2a5e57eb3832a6265e145dee0079c82d210604ff1f045cf98e2f7c6124fd26736a3fe4a39291cb004adcba2da9b8c35306401a622f1d90150
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-