General

  • Target

    blender-4.1.0-windows-x64.msi

  • Size

    327.2MB

  • Sample

    240425-qdebeaba3w

  • MD5

    73795af9a97434f16659a165b735e214

  • SHA1

    69243846c97241f752877b0d541bcefce922d853

  • SHA256

    f09ebea88c6c4875207799f8c0fdfc0382e54724a2512546f74606e63dba6e63

  • SHA512

    ded2890c1ad3bc717ac63b53d484e52d1abbe3259338209ea5d3d5e1740b6746c849eb2708e55578ebea0509407feebfcd5ad4b1126285ed34024f0f2c8d1990

  • SSDEEP

    6291456:LEtm60ARL1W2c7lXZIswuvDR7V/WSYTtnXsWTAF3n:LoeARx5uqsZrRV9YBnXTAh

Malware Config

Targets

    • Target

      blender-4.1.0-windows-x64.msi

    • Size

      327.2MB

    • MD5

      73795af9a97434f16659a165b735e214

    • SHA1

      69243846c97241f752877b0d541bcefce922d853

    • SHA256

      f09ebea88c6c4875207799f8c0fdfc0382e54724a2512546f74606e63dba6e63

    • SHA512

      ded2890c1ad3bc717ac63b53d484e52d1abbe3259338209ea5d3d5e1740b6746c849eb2708e55578ebea0509407feebfcd5ad4b1126285ed34024f0f2c8d1990

    • SSDEEP

      6291456:LEtm60ARL1W2c7lXZIswuvDR7V/WSYTtnXsWTAF3n:LoeARx5uqsZrRV9YBnXTAh

    Score
    6/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Resource Forking

1
T1564.009

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks