General
-
Target
da2216c28de4c1bf15ea1333d19a0ebb
-
Size
36KB
-
Sample
230214-jh2tyabg46
-
MD5
da2216c28de4c1bf15ea1333d19a0ebb
-
SHA1
7fd6ef70ef30966a159188c4f1efcd1ab7d16c48
-
SHA256
29e447a6121dd2b1d1221821bd6c4b0e20c437c62264844e8bcbb9d4be35f013
-
SHA512
07c50afb9e9673113ee32e6b3e0340389ab7754ce9f1ef26a5be7948c00f99242ed4ff1bf5d108f10708ffcc85b3845e259a4e238fb298e7fad50c3f1ab78a0d
-
SSDEEP
384:NGLEjChKES+9JZ2Xy3M5sloXbGWv4afooqx5Pey3M5sC0iu:/t+4WMmcGHaUeWMmC
Static task
static1
Behavioral task
behavioral1
Sample
da2216c28de4c1bf15ea1333d19a0ebb.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da2216c28de4c1bf15ea1333d19a0ebb.msi
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
da2216c28de4c1bf15ea1333d19a0ebb
-
Size
36KB
-
MD5
da2216c28de4c1bf15ea1333d19a0ebb
-
SHA1
7fd6ef70ef30966a159188c4f1efcd1ab7d16c48
-
SHA256
29e447a6121dd2b1d1221821bd6c4b0e20c437c62264844e8bcbb9d4be35f013
-
SHA512
07c50afb9e9673113ee32e6b3e0340389ab7754ce9f1ef26a5be7948c00f99242ed4ff1bf5d108f10708ffcc85b3845e259a4e238fb298e7fad50c3f1ab78a0d
-
SSDEEP
384:NGLEjChKES+9JZ2Xy3M5sloXbGWv4afooqx5Pey3M5sC0iu:/t+4WMmcGHaUeWMmC
Score8/10-
Blocklisted process makes network request
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-