General

  • Target

    Capture 2024.0.35.msi

  • Size

    395.9MB

  • Sample

    240418-s1tqqaaa61

  • MD5

    565c52aef1c42597efa41d3f09106f47

  • SHA1

    5077508df5871eeff2e2edd587c51e81b7dcd9c4

  • SHA256

    24694b324b43e7e00c6a5b8655a901fe3126035e499ff404510094cfba169f31

  • SHA512

    d3f1590109d9330a37cfc9539164ab36ff669fb6a406816f2e8ead46796cf890d5d8341f452ef2e64da632f7f8c4c6d582cbf42857a34cf12895c840d4cc7913

  • SSDEEP

    6291456:djp1x4Myo2svioUBtNPr93C2OgcRISS+omnRpZPode7VJ6CcsN0CEf+1:dt1c6iokLDwgcI3Sy07VJ6CcGZEs

Malware Config

Targets

    • Target

      Capture 2024.0.35.msi

    • Size

      395.9MB

    • MD5

      565c52aef1c42597efa41d3f09106f47

    • SHA1

      5077508df5871eeff2e2edd587c51e81b7dcd9c4

    • SHA256

      24694b324b43e7e00c6a5b8655a901fe3126035e499ff404510094cfba169f31

    • SHA512

      d3f1590109d9330a37cfc9539164ab36ff669fb6a406816f2e8ead46796cf890d5d8341f452ef2e64da632f7f8c4c6d582cbf42857a34cf12895c840d4cc7913

    • SSDEEP

      6291456:djp1x4Myo2svioUBtNPr93C2OgcRISS+omnRpZPode7VJ6CcsN0CEf+1:dt1c6iokLDwgcI3Sy07VJ6CcGZEs

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks