General
-
Target
DOC#848#158945.msi
-
Size
264KB
-
Sample
211202-3fwppafgd3
-
MD5
c5b778c6e4b1410a079457c50193a0d5
-
SHA1
6abd263dbc4487e80db003eaf66f1843792eab0b
-
SHA256
50356478881e585ac8020c4e471f7494aef7cebae0bc2b98b6c106fd3b6c5ddf
-
SHA512
2a6e412743f2b35f73e74a4846130a2ac0703ee479d76e4132bd2b1f2c5a12b000aafccb40a2015543d5e58cf7dad1f707ac99b260aa43fa16939d3022eba6fe
Static task
static1
Behavioral task
behavioral1
Sample
DOC#848#158945.msi
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
DOC#848#158945.msi
Resource
win10-en-20211014
Malware Config
Extracted
latam_generic_downloader
http://russotto.duckdns.org/japas.pjmg
Targets
-
-
Target
DOC#848#158945.msi
-
Size
264KB
-
MD5
c5b778c6e4b1410a079457c50193a0d5
-
SHA1
6abd263dbc4487e80db003eaf66f1843792eab0b
-
SHA256
50356478881e585ac8020c4e471f7494aef7cebae0bc2b98b6c106fd3b6c5ddf
-
SHA512
2a6e412743f2b35f73e74a4846130a2ac0703ee479d76e4132bd2b1f2c5a12b000aafccb40a2015543d5e58cf7dad1f707ac99b260aa43fa16939d3022eba6fe
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-