General
-
Target
elefant_launcher.msi
-
Size
22.3MB
-
Sample
241113-xrrl8a1kfr
-
MD5
c7ca6e657fe2d291ebd77b60feaf5ea8
-
SHA1
b40f17227ddddb413dcf4b16bf27bba5bed0c28d
-
SHA256
7b35dc8b694227dc88547a19d855e51a2771d1e1928e58efcc84431c391915d6
-
SHA512
eeb658a3218f16cb3e368c71dc66a3e45b4bab21c4e04d658a07638486c5c0d74d9e88a90f5415783d572db13aa882226226430fb70e4d65cb42988ea18947b8
-
SSDEEP
393216:JiNJfV2aYybjBsoFXn+E8Y7ioh3ZHayINK1nBSkaunjiaLwSD6xSlaxDG:EsybNJFX+EtiYhayINOAunj7LrOsF
Static task
static1
Behavioral task
behavioral1
Sample
elefant_launcher.msi
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
elefant_launcher.msi
-
Size
22.3MB
-
MD5
c7ca6e657fe2d291ebd77b60feaf5ea8
-
SHA1
b40f17227ddddb413dcf4b16bf27bba5bed0c28d
-
SHA256
7b35dc8b694227dc88547a19d855e51a2771d1e1928e58efcc84431c391915d6
-
SHA512
eeb658a3218f16cb3e368c71dc66a3e45b4bab21c4e04d658a07638486c5c0d74d9e88a90f5415783d572db13aa882226226430fb70e4d65cb42988ea18947b8
-
SSDEEP
393216:JiNJfV2aYybjBsoFXn+E8Y7ioh3ZHayINK1nBSkaunjiaLwSD6xSlaxDG:EsybNJFX+EtiYhayINOAunj7LrOsF
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-