General

  • Target

    Br_i421i2-2481-125_754864.msi

  • Size

    9.3MB

  • Sample

    240524-xmgw8afd9y

  • MD5

    dc2ff54f9664f90f09004b367fbdca10

  • SHA1

    e0dd52a75514bae7e68396e953eab1a62e567aa5

  • SHA256

    0cc32738dd2dbf5d0c128a9029783b6daa691c999683feae8b9caa4c0805eaad

  • SHA512

    3032476f1e6511371322c79fff6a45ccb5cc3c79a01db470f1c3c207e3557272b7f1b306218af46bc96cae243da843dae5f1006dff5e225e0d1deec3c552fcf5

  • SSDEEP

    196608:r/i0OAYet5vLXFZf6eB1No6Zd4vvrm89UcP7fbUDd57U8:Ti0OAY+N5ZfHB16RHrm8VT6Q

Score
8/10

Malware Config

Targets

    • Target

      Br_i421i2-2481-125_754864.msi

    • Size

      9.3MB

    • MD5

      dc2ff54f9664f90f09004b367fbdca10

    • SHA1

      e0dd52a75514bae7e68396e953eab1a62e567aa5

    • SHA256

      0cc32738dd2dbf5d0c128a9029783b6daa691c999683feae8b9caa4c0805eaad

    • SHA512

      3032476f1e6511371322c79fff6a45ccb5cc3c79a01db470f1c3c207e3557272b7f1b306218af46bc96cae243da843dae5f1006dff5e225e0d1deec3c552fcf5

    • SSDEEP

      196608:r/i0OAYet5vLXFZf6eB1No6Zd4vvrm89UcP7fbUDd57U8:Ti0OAY+N5ZfHB16RHrm8VT6Q

    Score
    8/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks