General
-
Target
9b862ca02691b2835921c956c649cc4688556ef4890c88f003738dcf4eec081d
-
Size
122KB
-
Sample
220520-ffc61sddfl
-
MD5
3a766212e85cf2d95610a7f480cab0fe
-
SHA1
7a3bbb1b8bb554cd433c595d7b09dd7e1d25b482
-
SHA256
9b862ca02691b2835921c956c649cc4688556ef4890c88f003738dcf4eec081d
-
SHA512
b8a3de4ec9fa767bde0379f4fd416b9e14243d88fe5b7380dfe3d8fe978bcd7e3acbe914bdccb81e9be7fbb06c0a55fb0e56a93ea1f686424b71c59461b9ddf0
Static task
static1
Behavioral task
behavioral1
Sample
2vFTA23042049-ABRIL.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2vFTA23042049-ABRIL.msi
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
2vFTA23042049-ABRIL.msi
-
Size
280KB
-
MD5
04e7028611b3a265f90a627f45e43721
-
SHA1
10cc07c9d057baff07aa81e5f6c3833f8c763f8d
-
SHA256
c51857627b43582a7f2995c27356717b474854716ddffabcc4ec03b0085bcc07
-
SHA512
e6f39b4e3d934eae2a47e2ee382c7560e3c8852e95d2ce72ee1a6eb31e92b8e102a922638077b16f31ebdb9da92e932649f43d755627b0c5a1c45bff360b5382
Score8/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-