General

  • Target

    Drake Hollow Free Download (v1 (1).msi

  • Size

    61.2MB

  • Sample

    240802-j6thgatbkq

  • MD5

    af2166cd2f6e50902405cc669b85fe37

  • SHA1

    c995d3359ceac7ff6663ed0e08e6420dfe26a244

  • SHA256

    d33680d861d53ff3bb9f27807bd210adaa2931e44ecb1010d7b95b0aff70cd80

  • SHA512

    0da7e6e7afb819d71f80fd035ce4e874653326558fb222c45a70a6661db4dfb03fc815f4251eb5fed0f9269c89ac2ee8953d3e7ff8588d10fde532f98c068538

  • SSDEEP

    1572864:iFXQ0aiC/wNPiI+D4wxEew9RHVRhjaZx4PmmXY3YRU2RJ7DlC:yai+yKiw6PHfhjaZx8o3YRU2v7Dl

Malware Config

Targets

    • Target

      Drake Hollow Free Download (v1 (1).msi

    • Size

      61.2MB

    • MD5

      af2166cd2f6e50902405cc669b85fe37

    • SHA1

      c995d3359ceac7ff6663ed0e08e6420dfe26a244

    • SHA256

      d33680d861d53ff3bb9f27807bd210adaa2931e44ecb1010d7b95b0aff70cd80

    • SHA512

      0da7e6e7afb819d71f80fd035ce4e874653326558fb222c45a70a6661db4dfb03fc815f4251eb5fed0f9269c89ac2ee8953d3e7ff8588d10fde532f98c068538

    • SSDEEP

      1572864:iFXQ0aiC/wNPiI+D4wxEew9RHVRhjaZx4PmmXY3YRU2RJ7DlC:yai+yKiw6PHfhjaZx8o3YRU2v7Dl

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks