General
-
Target
setup.msi
-
Size
9.3MB
-
Sample
240319-svwm5aga4w
-
MD5
9d8c1062a5017075fc1ea22fb52fded6
-
SHA1
4a1e72885acce5381ab5ef84034b9205fc10735c
-
SHA256
9eeb9bdd9680d5db1721d77a874b0db3b9548876852caa309f17497e8ff9b1ec
-
SHA512
2071ac2df556037e919657c14554df3e70d9cac085da254d105c36d7de64b90e1318635e4b60f4f172f7e7f30d59107e2cae1ff742aaba297416edbe48e749da
-
SSDEEP
196608:gNiImdD+GIfVlhQ+gtODuwjWT6mPu2EFfbRv0:gsBFIfVlhQ+glwY6AunFj
Static task
static1
Behavioral task
behavioral1
Sample
setup.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
setup.msi
Resource
win10v2004-20231215-en
Malware Config
Extracted
https://wryrwhte.monster/dark6.bs64
Targets
-
-
Target
setup.msi
-
Size
9.3MB
-
MD5
9d8c1062a5017075fc1ea22fb52fded6
-
SHA1
4a1e72885acce5381ab5ef84034b9205fc10735c
-
SHA256
9eeb9bdd9680d5db1721d77a874b0db3b9548876852caa309f17497e8ff9b1ec
-
SHA512
2071ac2df556037e919657c14554df3e70d9cac085da254d105c36d7de64b90e1318635e4b60f4f172f7e7f30d59107e2cae1ff742aaba297416edbe48e749da
-
SSDEEP
196608:gNiImdD+GIfVlhQ+gtODuwjWT6mPu2EFfbRv0:gsBFIfVlhQ+glwY6AunFj
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-