General

  • Target

    SirixStation-enjoypumarkets1.9.49688.0_JC.msi

  • Size

    13.4MB

  • Sample

    231021-kt566sdf6t

  • MD5

    75640d92963192670524067d9fb1b560

  • SHA1

    699e708155a657e177d031701424fc26d8b2d8e9

  • SHA256

    058adb3c51411c048b89491fed3a09d7ccbdbe3c2d52bc82fe3cbcce5bcfa1ac

  • SHA512

    c4f4164577fcb46eb7def6231a1b0ac217ec67bf5df56707ccfe90831b275693341c27706f8c43786eb4bd6e37560a7a7fd24b19427feb2465b86144acf5c6e0

  • SSDEEP

    393216:lpkokD0t6CmGeTrSJPk1HulyI1CMoCQqvV:lpuAPaSJPkJulyI15nQqvV

Score
7/10

Malware Config

Targets

    • Target

      SirixStation-enjoypumarkets1.9.49688.0_JC.msi

    • Size

      13.4MB

    • MD5

      75640d92963192670524067d9fb1b560

    • SHA1

      699e708155a657e177d031701424fc26d8b2d8e9

    • SHA256

      058adb3c51411c048b89491fed3a09d7ccbdbe3c2d52bc82fe3cbcce5bcfa1ac

    • SHA512

      c4f4164577fcb46eb7def6231a1b0ac217ec67bf5df56707ccfe90831b275693341c27706f8c43786eb4bd6e37560a7a7fd24b19427feb2465b86144acf5c6e0

    • SSDEEP

      393216:lpkokD0t6CmGeTrSJPk1HulyI1CMoCQqvV:lpuAPaSJPkJulyI15nQqvV

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks