General

  • Target

    d31d4e20023b2a9986472ad56026973b.msi

  • Size

    244KB

  • Sample

    230426-jz9k4shh7v

  • MD5

    d31d4e20023b2a9986472ad56026973b

  • SHA1

    b5d6d32ce5a3d3fbe4a65a5e8ed94ac2fd8c63ce

  • SHA256

    3da364255a8c7b08a9ad0573fa95e55359d0f1e44727a6493df3ca217cbf6826

  • SHA512

    66976904ba437dfe031aea6f26b48fe9127db2916b19bbd2a1ade786bbb315a60dee3fcdecbfbed226042afef003ad9b3a6d561c57a1fad277fab9ac2e6fb9e3

  • SSDEEP

    3072:yh200qvnjBlA5GwYyBCLu0mIewNtBWnVtbqmyIGltV0H:a20zvnjj+3YECLugrHbZIG2H

Score
8/10

Malware Config

Targets

    • Target

      d31d4e20023b2a9986472ad56026973b.msi

    • Size

      244KB

    • MD5

      d31d4e20023b2a9986472ad56026973b

    • SHA1

      b5d6d32ce5a3d3fbe4a65a5e8ed94ac2fd8c63ce

    • SHA256

      3da364255a8c7b08a9ad0573fa95e55359d0f1e44727a6493df3ca217cbf6826

    • SHA512

      66976904ba437dfe031aea6f26b48fe9127db2916b19bbd2a1ade786bbb315a60dee3fcdecbfbed226042afef003ad9b3a6d561c57a1fad277fab9ac2e6fb9e3

    • SSDEEP

      3072:yh200qvnjBlA5GwYyBCLu0mIewNtBWnVtbqmyIGltV0H:a20zvnjj+3YECLugrHbZIG2H

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks