General

  • Target

    teramind_agent_x64_s.msi

  • Size

    32.4MB

  • Sample

    230321-naqh6ahh85

  • MD5

    3911f7d78a5c2a9a34657ee9ca2266df

  • SHA1

    39d0168a91b341db0e9fcebf6799f81b80ec972b

  • SHA256

    b4a53fa008bf5d8b491216992bb84b3743bdebc7d15f24959a70f0db63231d31

  • SHA512

    77922f87aa5c82a0982e28257c9f68afbabe47b42ec0044a12e6c6ac45fbd9d0791aa19131cd99ddc86b9e1edb7cf673a92041e6e2fc142c3d39daf76af986ae

  • SSDEEP

    786432:lqASe6PnKsNW+KfU2aV7GTYSH0jZazLHmUhg2WyVs3:lqASe6PK2W+KQVyTYI8YzLFi2B

Score
8/10

Malware Config

Targets

    • Target

      teramind_agent_x64_s.msi

    • Size

      32.4MB

    • MD5

      3911f7d78a5c2a9a34657ee9ca2266df

    • SHA1

      39d0168a91b341db0e9fcebf6799f81b80ec972b

    • SHA256

      b4a53fa008bf5d8b491216992bb84b3743bdebc7d15f24959a70f0db63231d31

    • SHA512

      77922f87aa5c82a0982e28257c9f68afbabe47b42ec0044a12e6c6ac45fbd9d0791aa19131cd99ddc86b9e1edb7cf673a92041e6e2fc142c3d39daf76af986ae

    • SSDEEP

      786432:lqASe6PnKsNW+KfU2aV7GTYSH0jZazLHmUhg2WyVs3:lqASe6PK2W+KQVyTYI8YzLFi2B

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks