General
-
Target
3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70.msi
-
Size
4.9MB
-
Sample
240515-tgzy3agh4z
-
MD5
76cb7942862b8e5ac5c86c7cbab709bd
-
SHA1
0c0631dc78a8add250dd225f67a918f3f9c71524
-
SHA256
3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70
-
SHA512
b9ca576c949f79f123b6cf0d9d3469f47c88ee6f53c9f6e97643fc529ee5a360c95172457b4b2eddb0836baf68d88ffd9a958f8a3cbcca270bcfeb519dc22752
-
SSDEEP
98304:wyclEycl/Y5AbXwNSOgbPJ84mkWQBlVbZ0L8xKpIx0Ttq6zVommY:wyIEyINXwNUJdV9jxK1tqOeQ
Static task
static1
Behavioral task
behavioral1
Sample
3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70.msi
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70.msi
-
Size
4.9MB
-
MD5
76cb7942862b8e5ac5c86c7cbab709bd
-
SHA1
0c0631dc78a8add250dd225f67a918f3f9c71524
-
SHA256
3d36a85048e6c35edac1fcc9e9a00bc140f18bac364b61cbe43d04ae7d2c1d70
-
SHA512
b9ca576c949f79f123b6cf0d9d3469f47c88ee6f53c9f6e97643fc529ee5a360c95172457b4b2eddb0836baf68d88ffd9a958f8a3cbcca270bcfeb519dc22752
-
SSDEEP
98304:wyclEycl/Y5AbXwNSOgbPJ84mkWQBlVbZ0L8xKpIx0Ttq6zVommY:wyIEyINXwNUJdV9jxK1tqOeQ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-