General
-
Target
Oic.msi
-
Size
1.1MB
-
Sample
231206-w5gthabf23
-
MD5
e5f9b2809ffcda140bfb687572bea0f3
-
SHA1
1e4f85f3c6c50d0035c12f15510ffd05775deee6
-
SHA256
6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
-
SHA512
2474dfdd42fcf65b6e20accca4dd8c47dd829b38379805e72670af61f35ff9c6567358c0e58b5911c074010f408573173028c9346f2a5f1d4952732124527f77
-
SSDEEP
24576:u5WnUeiNpNj02PsQ67IzRNYZcE++dQoDvgW/MI2crW6w:Aei3Nj9bMmhUtDD/MdcrW6w
Static task
static1
Behavioral task
behavioral1
Sample
Oic.msi
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
Oic.msi
Resource
win10v2004-20231130-en
Malware Config
Targets
-
-
Target
Oic.msi
-
Size
1.1MB
-
MD5
e5f9b2809ffcda140bfb687572bea0f3
-
SHA1
1e4f85f3c6c50d0035c12f15510ffd05775deee6
-
SHA256
6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
-
SHA512
2474dfdd42fcf65b6e20accca4dd8c47dd829b38379805e72670af61f35ff9c6567358c0e58b5911c074010f408573173028c9346f2a5f1d4952732124527f77
-
SSDEEP
24576:u5WnUeiNpNj02PsQ67IzRNYZcE++dQoDvgW/MI2crW6w:Aei3Nj9bMmhUtDD/MdcrW6w
Score8/10-
Dave packer
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-