General
-
Target
c440d1721cb83183eb397171531888556f544659e1640bf974ed55548016ed3c.msi.vir
-
Size
106.0MB
-
Sample
241121-c53w7asnek
-
MD5
13efd06a23bfa0e958907db33d947ff9
-
SHA1
57b60766072b7037ca5c5d31a23dd57e332421b8
-
SHA256
c440d1721cb83183eb397171531888556f544659e1640bf974ed55548016ed3c
-
SHA512
b2a914c5359a636003d3dc45b8be36a8e059f40893f171a845969ab5a791310f6a86337205f775a0ca0807ddc8a6fcf294a6cf64c990ae58bd2466b1954bb3e0
-
SSDEEP
3145728:8Cc6i9DJclUWcTsPsz+gpvp0lHEavPwsJ+KkKELYfFY:+rDJciusz+gNpUkGP/J+xEfFY
Static task
static1
Behavioral task
behavioral1
Sample
c440d1721cb83183eb397171531888556f544659e1640bf974ed55548016ed3c.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c440d1721cb83183eb397171531888556f544659e1640bf974ed55548016ed3c.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c440d1721cb83183eb397171531888556f544659e1640bf974ed55548016ed3c.msi.vir
-
Size
106.0MB
-
MD5
13efd06a23bfa0e958907db33d947ff9
-
SHA1
57b60766072b7037ca5c5d31a23dd57e332421b8
-
SHA256
c440d1721cb83183eb397171531888556f544659e1640bf974ed55548016ed3c
-
SHA512
b2a914c5359a636003d3dc45b8be36a8e059f40893f171a845969ab5a791310f6a86337205f775a0ca0807ddc8a6fcf294a6cf64c990ae58bd2466b1954bb3e0
-
SSDEEP
3145728:8Cc6i9DJclUWcTsPsz+gpvp0lHEavPwsJ+KkKELYfFY:+rDJciusz+gNpUkGP/J+xEfFY
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1