General
-
Target
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
-
Size
13.4MB
-
Sample
231021-kt566sdf6t
-
MD5
75640d92963192670524067d9fb1b560
-
SHA1
699e708155a657e177d031701424fc26d8b2d8e9
-
SHA256
058adb3c51411c048b89491fed3a09d7ccbdbe3c2d52bc82fe3cbcce5bcfa1ac
-
SHA512
c4f4164577fcb46eb7def6231a1b0ac217ec67bf5df56707ccfe90831b275693341c27706f8c43786eb4bd6e37560a7a7fd24b19427feb2465b86144acf5c6e0
-
SSDEEP
393216:lpkokD0t6CmGeTrSJPk1HulyI1CMoCQqvV:lpuAPaSJPkJulyI15nQqvV
Static task
static1
Behavioral task
behavioral1
Sample
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
SirixStation-enjoypumarkets1.9.49688.0_JC.msi
-
Size
13.4MB
-
MD5
75640d92963192670524067d9fb1b560
-
SHA1
699e708155a657e177d031701424fc26d8b2d8e9
-
SHA256
058adb3c51411c048b89491fed3a09d7ccbdbe3c2d52bc82fe3cbcce5bcfa1ac
-
SHA512
c4f4164577fcb46eb7def6231a1b0ac217ec67bf5df56707ccfe90831b275693341c27706f8c43786eb4bd6e37560a7a7fd24b19427feb2465b86144acf5c6e0
-
SSDEEP
393216:lpkokD0t6CmGeTrSJPk1HulyI1CMoCQqvV:lpuAPaSJPkJulyI15nQqvV
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-