General

  • Target

    Reader2017Setup_x86.msi

  • Size

    46.3MB

  • Sample

    240629-w26y8awdmq

  • MD5

    1f1b37f2b67e470941244ab5e8bd1ad1

  • SHA1

    7727ec08ce3cff7cba4d9e5c9660f91d050e00cf

  • SHA256

    ac6c0aa5b8119fcfaf27d92815d4cebb42bf0e9c9f81b2760452890631a4800e

  • SHA512

    2cfcf09c366ff1b044e322fa0467be5fd730a498e0b91e4047e3625f7d4bca82ff94c82af345c2aaa035afa6139b0c88b89a14c7a4952e7a7c06e931709f5589

  • SSDEEP

    786432:vfnZrYDdcBcu4VW1E1igWpsstYg/LOLkLkjoUL31IDGkoTC+0tac0Mj4S467qomY:NiGBc9Wa1ig3oYgTwkLks0/e+qaep

Malware Config

Targets

    • Target

      Reader2017Setup_x86.msi

    • Size

      46.3MB

    • MD5

      1f1b37f2b67e470941244ab5e8bd1ad1

    • SHA1

      7727ec08ce3cff7cba4d9e5c9660f91d050e00cf

    • SHA256

      ac6c0aa5b8119fcfaf27d92815d4cebb42bf0e9c9f81b2760452890631a4800e

    • SHA512

      2cfcf09c366ff1b044e322fa0467be5fd730a498e0b91e4047e3625f7d4bca82ff94c82af345c2aaa035afa6139b0c88b89a14c7a4952e7a7c06e931709f5589

    • SSDEEP

      786432:vfnZrYDdcBcu4VW1E1igWpsstYg/LOLkLkjoUL31IDGkoTC+0tac0Mj4S467qomY:NiGBc9Wa1ig3oYgTwkLks0/e+qaep

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks