General

  • Target

    elefant_launcher.msi

  • Size

    22.3MB

  • Sample

    241113-xrrl8a1kfr

  • MD5

    c7ca6e657fe2d291ebd77b60feaf5ea8

  • SHA1

    b40f17227ddddb413dcf4b16bf27bba5bed0c28d

  • SHA256

    7b35dc8b694227dc88547a19d855e51a2771d1e1928e58efcc84431c391915d6

  • SHA512

    eeb658a3218f16cb3e368c71dc66a3e45b4bab21c4e04d658a07638486c5c0d74d9e88a90f5415783d572db13aa882226226430fb70e4d65cb42988ea18947b8

  • SSDEEP

    393216:JiNJfV2aYybjBsoFXn+E8Y7ioh3ZHayINK1nBSkaunjiaLwSD6xSlaxDG:EsybNJFX+EtiYhayINOAunj7LrOsF

Malware Config

Targets

    • Target

      elefant_launcher.msi

    • Size

      22.3MB

    • MD5

      c7ca6e657fe2d291ebd77b60feaf5ea8

    • SHA1

      b40f17227ddddb413dcf4b16bf27bba5bed0c28d

    • SHA256

      7b35dc8b694227dc88547a19d855e51a2771d1e1928e58efcc84431c391915d6

    • SHA512

      eeb658a3218f16cb3e368c71dc66a3e45b4bab21c4e04d658a07638486c5c0d74d9e88a90f5415783d572db13aa882226226430fb70e4d65cb42988ea18947b8

    • SSDEEP

      393216:JiNJfV2aYybjBsoFXn+E8Y7ioh3ZHayINK1nBSkaunjiaLwSD6xSlaxDG:EsybNJFX+EtiYhayINOAunj7LrOsF

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Share Discovery

      Attempt to gather information on host network.

MITRE ATT&CK Enterprise v15

Tasks