General

  • Target

    634141ba2a59b2474677ce121e65d8c6.msi

  • Size

    2.9MB

  • Sample

    211125-ve6t9sfhbl

  • MD5

    634141ba2a59b2474677ce121e65d8c6

  • SHA1

    9fd4068c432e354d2e2c67c96f84ce96abe2406e

  • SHA256

    67525ed96e0f69af2de778ad3679ba45b620b8f80b45d46035c7fde19eab9648

  • SHA512

    32e0e1a28c645563d5500e05a7cdc3131f9c845fa7e55da716d53347cd99839a54fdb66ac3b43e851901edf77a318a3329a7b2c60e6eeb5f2ccfc75c6f8df087

Score
8/10

Malware Config

Targets

    • Target

      634141ba2a59b2474677ce121e65d8c6.msi

    • Size

      2.9MB

    • MD5

      634141ba2a59b2474677ce121e65d8c6

    • SHA1

      9fd4068c432e354d2e2c67c96f84ce96abe2406e

    • SHA256

      67525ed96e0f69af2de778ad3679ba45b620b8f80b45d46035c7fde19eab9648

    • SHA512

      32e0e1a28c645563d5500e05a7cdc3131f9c845fa7e55da716d53347cd99839a54fdb66ac3b43e851901edf77a318a3329a7b2c60e6eeb5f2ccfc75c6f8df087

    Score
    8/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks