General
-
Target
face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666.zip
-
Size
191KB
-
Sample
220621-nq2lcsfed8
-
MD5
126dd26f967a75a17b88813d9a678a71
-
SHA1
35669800737f930c232db6cd18d2fa9416e95fb3
-
SHA256
0892bb5240b7208884c2ae06c38e79150e52ff6df2659c8239762451685174ad
-
SHA512
616b25b9a9ca695e908c4e2146cd22be327157dd72ccac224680e864d238038862acdde43212d528acadaaf1be36a41f704b326d7255cdbc9bfb0238e7b3a89c
Static task
static1
Behavioral task
behavioral1
Sample
face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666.msi
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666.msi
-
Size
224KB
-
MD5
ff82937564ff59eb6207f079cdc8e43d
-
SHA1
7cfe0a71c4a2508a1af80e640ec8b1b034edb604
-
SHA256
face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666
-
SHA512
4c4c2f59ef157de6570bf16daff958d9ccdafd8ba6cf3f946cabaa413c085c05242b2499552e789f0f0bc9e1cbf0b74ec6327340d29c80a694aeddf444788ee1
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-