General
-
Target
1d9e0649296e83c003d1e27dcf9e1363bdf83bd754cdfa125ab9f5ca3acd61be
-
Size
2.9MB
-
Sample
241009-qc85dsvenm
-
MD5
313c8404f8d47bf21fce21034c8dbf9e
-
SHA1
e45effa5952409e2387b3e55194bca78e64c753b
-
SHA256
1d9e0649296e83c003d1e27dcf9e1363bdf83bd754cdfa125ab9f5ca3acd61be
-
SHA512
ff33ed4dca573cf158dc8baea1fbe27ef3ef3b188a24883d44d8ac97a972c80e241d0d3bc11e07448705de0672abec582ae58fbe54f55affb64ad754a6383f35
-
SSDEEP
49152:2+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:2+lUlz9FKbsodq0YaH7ZPxMb8tT
Behavioral task
behavioral1
Sample
1d9e0649296e83c003d1e27dcf9e1363bdf83bd754cdfa125ab9f5ca3acd61be.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1d9e0649296e83c003d1e27dcf9e1363bdf83bd754cdfa125ab9f5ca3acd61be
-
Size
2.9MB
-
MD5
313c8404f8d47bf21fce21034c8dbf9e
-
SHA1
e45effa5952409e2387b3e55194bca78e64c753b
-
SHA256
1d9e0649296e83c003d1e27dcf9e1363bdf83bd754cdfa125ab9f5ca3acd61be
-
SHA512
ff33ed4dca573cf158dc8baea1fbe27ef3ef3b188a24883d44d8ac97a972c80e241d0d3bc11e07448705de0672abec582ae58fbe54f55affb64ad754a6383f35
-
SSDEEP
49152:2+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:2+lUlz9FKbsodq0YaH7ZPxMb8tT
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1