General
-
Target
Br_i421i2-2481-125_754864.msi
-
Size
9.3MB
-
Sample
240524-xmgw8afd9y
-
MD5
dc2ff54f9664f90f09004b367fbdca10
-
SHA1
e0dd52a75514bae7e68396e953eab1a62e567aa5
-
SHA256
0cc32738dd2dbf5d0c128a9029783b6daa691c999683feae8b9caa4c0805eaad
-
SHA512
3032476f1e6511371322c79fff6a45ccb5cc3c79a01db470f1c3c207e3557272b7f1b306218af46bc96cae243da843dae5f1006dff5e225e0d1deec3c552fcf5
-
SSDEEP
196608:r/i0OAYet5vLXFZf6eB1No6Zd4vvrm89UcP7fbUDd57U8:Ti0OAY+N5ZfHB16RHrm8VT6Q
Static task
static1
Behavioral task
behavioral1
Sample
Br_i421i2-2481-125_754864.msi
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Br_i421i2-2481-125_754864.msi
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Br_i421i2-2481-125_754864.msi
-
Size
9.3MB
-
MD5
dc2ff54f9664f90f09004b367fbdca10
-
SHA1
e0dd52a75514bae7e68396e953eab1a62e567aa5
-
SHA256
0cc32738dd2dbf5d0c128a9029783b6daa691c999683feae8b9caa4c0805eaad
-
SHA512
3032476f1e6511371322c79fff6a45ccb5cc3c79a01db470f1c3c207e3557272b7f1b306218af46bc96cae243da843dae5f1006dff5e225e0d1deec3c552fcf5
-
SSDEEP
196608:r/i0OAYet5vLXFZf6eB1No6Zd4vvrm89UcP7fbUDd57U8:Ti0OAY+N5ZfHB16RHrm8VT6Q
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-