General
-
Target
8f07ea738d1c69b74fac16cabe39e858.msi
-
Size
730KB
-
Sample
221231-mq46tahe32
-
MD5
8f07ea738d1c69b74fac16cabe39e858
-
SHA1
2a4c4e73106b0dcb87fbfc4a14426e72e0c368b6
-
SHA256
0038c99f2a5285acd2d4ed02c9a444b93c01e8e632b995cf30103e2e4f067329
-
SHA512
db3a5884f0c71923ff5aee2e4341d495cd863f68894bab5a8d7426c31e53f2362bc55ec74da76c065e54625f5eb9e3ba07fcb040d3320771a44da6eed34fab66
-
SSDEEP
12288:GGpswznMosyIa3FZjiazH1BpQc2Yf4U4oXMf6p2XHJZNNNh:GGOw7MAFZjiaZBuc2g4jocf6p2XHXNNr
Behavioral task
behavioral1
Sample
8f07ea738d1c69b74fac16cabe39e858.msi
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f07ea738d1c69b74fac16cabe39e858.msi
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
8f07ea738d1c69b74fac16cabe39e858.msi
-
Size
730KB
-
MD5
8f07ea738d1c69b74fac16cabe39e858
-
SHA1
2a4c4e73106b0dcb87fbfc4a14426e72e0c368b6
-
SHA256
0038c99f2a5285acd2d4ed02c9a444b93c01e8e632b995cf30103e2e4f067329
-
SHA512
db3a5884f0c71923ff5aee2e4341d495cd863f68894bab5a8d7426c31e53f2362bc55ec74da76c065e54625f5eb9e3ba07fcb040d3320771a44da6eed34fab66
-
SSDEEP
12288:GGpswznMosyIa3FZjiazH1BpQc2Yf4U4oXMf6p2XHJZNNNh:GGOw7MAFZjiaZBuc2g4jocf6p2XHXNNr
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-