General

  • Target

    sqlncli.msi

  • Size

    4.8MB

  • Sample

    231206-fbybdsbd22

  • MD5

    129fc6413083694818cbc0a297d706fd

  • SHA1

    a391bf631cca15e5ceb4bd6b5d17eae4b1ea25c3

  • SHA256

    6737269ad63771c15b6e249209bee0ec2ad1231503efd9e1f1a7213ee7e70886

  • SHA512

    bf5c80cf62a4dc71f8d0c0e6e9a1dfa29fd021dc02982df1d55df068e4b950b19e44e06affbde2d7ec5572d3ae5a8c41832d6e8d76d1dfa51eb10d4a8de813f7

  • SSDEEP

    98304:n2EFqz1zS25sCnwT4h85R/x7ijbq/0WePORfD3yxa:nLFqZS2B1WR/4fq/0WA5

Score
7/10

Malware Config

Targets

    • Target

      sqlncli.msi

    • Size

      4.8MB

    • MD5

      129fc6413083694818cbc0a297d706fd

    • SHA1

      a391bf631cca15e5ceb4bd6b5d17eae4b1ea25c3

    • SHA256

      6737269ad63771c15b6e249209bee0ec2ad1231503efd9e1f1a7213ee7e70886

    • SHA512

      bf5c80cf62a4dc71f8d0c0e6e9a1dfa29fd021dc02982df1d55df068e4b950b19e44e06affbde2d7ec5572d3ae5a8c41832d6e8d76d1dfa51eb10d4a8de813f7

    • SSDEEP

      98304:n2EFqz1zS25sCnwT4h85R/x7ijbq/0WePORfD3yxa:nLFqZS2B1WR/4fq/0WA5

    Score
    7/10
    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks