General
-
Target
file.msi
-
Size
2.2MB
-
Sample
221202-xrchaseb52
-
MD5
4c4fd324221460698be179ed4b95707e
-
SHA1
94d65f66c2c825d647b313704aed76ae22f58907
-
SHA256
fee633634ddcd2c568619df14099bde7de010ab7a31c6a683c366b9957f19530
-
SHA512
3f0220e0eb94f1cab246063ee757267c8c5a7120d719c460ebcfd64507a008a7810ae9d37e9d3129f4e531746d0a37c10628c9e73acbb11ebb4732b55085614e
-
SSDEEP
49152:I2cy7PWnqSo21UEISKZwtjDnTHwzlEkCWSVKob/3/0:I2rP30UEIpZaDTQGkj6b/8
Static task
static1
Behavioral task
behavioral1
Sample
file.msi
Resource
win7-20220901-de
Behavioral task
behavioral2
Sample
file.msi
Resource
win10v2004-20221111-de
Malware Config
Targets
-
-
Target
file.msi
-
Size
2.2MB
-
MD5
4c4fd324221460698be179ed4b95707e
-
SHA1
94d65f66c2c825d647b313704aed76ae22f58907
-
SHA256
fee633634ddcd2c568619df14099bde7de010ab7a31c6a683c366b9957f19530
-
SHA512
3f0220e0eb94f1cab246063ee757267c8c5a7120d719c460ebcfd64507a008a7810ae9d37e9d3129f4e531746d0a37c10628c9e73acbb11ebb4732b55085614e
-
SSDEEP
49152:I2cy7PWnqSo21UEISKZwtjDnTHwzlEkCWSVKob/3/0:I2rP30UEIpZaDTQGkj6b/8
Score8/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-