General

  • Target

    Mia_Khalifa 18+.msi

  • Size

    64.5MB

  • Sample

    240218-12w68sfa9y

  • MD5

    a347250844a6e54c27bd5fcc464dae85

  • SHA1

    3b27a896233eb882d1475f773836bf69d1c3bddf

  • SHA256

    bfa7a13a97f61cc63ae748ad806978d11391a5c17b1a8a8f4fbaadf07f4e0891

  • SHA512

    9b9b3776ee46ed61bb9ecf8b9c04a4607097c88a873616ab83b21c5a1fde304424191d5399899b1665f9d99824d3243e3cc29a9358a857872c93f7e6aa0a5935

  • SSDEEP

    1572864:Y4pJnZxr9EOH5skMiNRvKT8SVNWX/nNKRtYA3X8gHAn/VIK:YgJL3svi3iTNVNWX/n0rDnNgn/G

Score
6/10

Malware Config

Targets

    • Target

      Mia_Khalifa 18+.msi

    • Size

      64.5MB

    • MD5

      a347250844a6e54c27bd5fcc464dae85

    • SHA1

      3b27a896233eb882d1475f773836bf69d1c3bddf

    • SHA256

      bfa7a13a97f61cc63ae748ad806978d11391a5c17b1a8a8f4fbaadf07f4e0891

    • SHA512

      9b9b3776ee46ed61bb9ecf8b9c04a4607097c88a873616ab83b21c5a1fde304424191d5399899b1665f9d99824d3243e3cc29a9358a857872c93f7e6aa0a5935

    • SSDEEP

      1572864:Y4pJnZxr9EOH5skMiNRvKT8SVNWX/nNKRtYA3X8gHAn/VIK:YgJL3svi3iTNVNWX/n0rDnNgn/G

    Score
    6/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Enterprise v15

Tasks