General

  • Target

    QxlWddmDod_0.21.0.0_x64.msi

  • Size

    1.2MB

  • Sample

    230603-jhz1caga34

  • MD5

    fd02685fa40e1d7c8340fca32a1ac8fe

  • SHA1

    75c4b8150d866586a53ab171899e3689f263e04b

  • SHA256

    cdc3031a30bbab2c22d0ee211a1ede49cd809ff3b208f7fdd07f5108b0b4c52b

  • SHA512

    3ccdd2095298f65057829ac921e1cc0b53ae0a016a6d116795d5d727d3869e28284565f248ff6e7549538cda8cec4f99f68178332039b959d94cfaeea6029727

  • SSDEEP

    24576:N7a1kxSYYKVIMgWFN/ExN0wh69DUwevflGIWh:JmnYGW0xph69gflG

Score
8/10

Malware Config

Targets

    • Target

      QxlWddmDod_0.21.0.0_x64.msi

    • Size

      1.2MB

    • MD5

      fd02685fa40e1d7c8340fca32a1ac8fe

    • SHA1

      75c4b8150d866586a53ab171899e3689f263e04b

    • SHA256

      cdc3031a30bbab2c22d0ee211a1ede49cd809ff3b208f7fdd07f5108b0b4c52b

    • SHA512

      3ccdd2095298f65057829ac921e1cc0b53ae0a016a6d116795d5d727d3869e28284565f248ff6e7549538cda8cec4f99f68178332039b959d94cfaeea6029727

    • SSDEEP

      24576:N7a1kxSYYKVIMgWFN/ExN0wh69DUwevflGIWh:JmnYGW0xph69gflG

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks