General

  • Target

    face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666.zip

  • Size

    191KB

  • Sample

    220621-nq2lcsfed8

  • MD5

    126dd26f967a75a17b88813d9a678a71

  • SHA1

    35669800737f930c232db6cd18d2fa9416e95fb3

  • SHA256

    0892bb5240b7208884c2ae06c38e79150e52ff6df2659c8239762451685174ad

  • SHA512

    616b25b9a9ca695e908c4e2146cd22be327157dd72ccac224680e864d238038862acdde43212d528acadaaf1be36a41f704b326d7255cdbc9bfb0238e7b3a89c

Score
10/10

Malware Config

Targets

    • Target

      face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666.msi

    • Size

      224KB

    • MD5

      ff82937564ff59eb6207f079cdc8e43d

    • SHA1

      7cfe0a71c4a2508a1af80e640ec8b1b034edb604

    • SHA256

      face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666

    • SHA512

      4c4c2f59ef157de6570bf16daff958d9ccdafd8ba6cf3f946cabaa413c085c05242b2499552e789f0f0bc9e1cbf0b74ec6327340d29c80a694aeddf444788ee1

    Score
    10/10
    • Matanbuchus

      A loader sold as MaaS first seen in February 2021.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks