General
-
Target
e21b2080c98beb0f04307a5a25630e23.msi
-
Size
6.7MB
-
Sample
241011-hn7rpszhmg
-
MD5
e21b2080c98beb0f04307a5a25630e23
-
SHA1
8fc24ad51e8d61324fe8de1be667862e9238cbbb
-
SHA256
0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e
-
SHA512
3706fde6569bccb39e2c58e86c60050c73bcdbe5c7eb05849ced33c75b5a1c3b080746c2e27420c6fffcd3497e1b1b6ab87e1b2d371a80fa3ae27851a64cfbea
-
SSDEEP
196608:QK4NkomkEmjut8DMcj4IWKPDNwmtoOCvHLNkAIdc:QKfkEmjuSMcxWKLNwunA5
Static task
static1
Behavioral task
behavioral1
Sample
e21b2080c98beb0f04307a5a25630e23.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e21b2080c98beb0f04307a5a25630e23.msi
Resource
win10v2004-20241007-en
Malware Config
Extracted
latentbot
besthard2024.zapto.org
Targets
-
-
Target
e21b2080c98beb0f04307a5a25630e23.msi
-
Size
6.7MB
-
MD5
e21b2080c98beb0f04307a5a25630e23
-
SHA1
8fc24ad51e8d61324fe8de1be667862e9238cbbb
-
SHA256
0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e
-
SHA512
3706fde6569bccb39e2c58e86c60050c73bcdbe5c7eb05849ced33c75b5a1c3b080746c2e27420c6fffcd3497e1b1b6ab87e1b2d371a80fa3ae27851a64cfbea
-
SSDEEP
196608:QK4NkomkEmjut8DMcj4IWKPDNwmtoOCvHLNkAIdc:QKfkEmjuSMcxWKLNwunA5
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies Windows Firewall
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1