General
-
Target
Capture 2024.0.35.msi
-
Size
395.9MB
-
Sample
240418-s1tqqaaa61
-
MD5
565c52aef1c42597efa41d3f09106f47
-
SHA1
5077508df5871eeff2e2edd587c51e81b7dcd9c4
-
SHA256
24694b324b43e7e00c6a5b8655a901fe3126035e499ff404510094cfba169f31
-
SHA512
d3f1590109d9330a37cfc9539164ab36ff669fb6a406816f2e8ead46796cf890d5d8341f452ef2e64da632f7f8c4c6d582cbf42857a34cf12895c840d4cc7913
-
SSDEEP
6291456:djp1x4Myo2svioUBtNPr93C2OgcRISS+omnRpZPode7VJ6CcsN0CEf+1:dt1c6iokLDwgcI3Sy07VJ6CcGZEs
Behavioral task
behavioral1
Sample
Capture 2024.0.35.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Capture 2024.0.35.msi
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
Capture 2024.0.35.msi
-
Size
395.9MB
-
MD5
565c52aef1c42597efa41d3f09106f47
-
SHA1
5077508df5871eeff2e2edd587c51e81b7dcd9c4
-
SHA256
24694b324b43e7e00c6a5b8655a901fe3126035e499ff404510094cfba169f31
-
SHA512
d3f1590109d9330a37cfc9539164ab36ff669fb6a406816f2e8ead46796cf890d5d8341f452ef2e64da632f7f8c4c6d582cbf42857a34cf12895c840d4cc7913
-
SSDEEP
6291456:djp1x4Myo2svioUBtNPr93C2OgcRISS+omnRpZPode7VJ6CcsN0CEf+1:dt1c6iokLDwgcI3Sy07VJ6CcGZEs
Score8/10-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-