General
-
Target
1.e.msi
-
Size
42.1MB
-
Sample
241121-l5d3ha1maz
-
MD5
c6482889fe38ab6fac54f0b220ac5407
-
SHA1
0a69fbde5b864d04ac9c28e2361b2d2e684c8f38
-
SHA256
0c70a985493b30edda772a39d108743e11b52569bccbb8e5b48a271765fb998d
-
SHA512
7e952a053c54cfd5dcc3854459ac53ccbf56880e4978030f32f55d433f545002683fc1a43a0e0d919f1b8608e84da72c7c1fa0b575171c91ca1d75048bee8934
-
SSDEEP
786432:Ik4FDMyBJdSbNA0Dmrv+XkyxQ+wFyz1thYPATnoYELCw:VkncYTRGyPqoLCw
Static task
static1
Behavioral task
behavioral1
Sample
1.e.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1.e.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1.e.msi
-
Size
42.1MB
-
MD5
c6482889fe38ab6fac54f0b220ac5407
-
SHA1
0a69fbde5b864d04ac9c28e2361b2d2e684c8f38
-
SHA256
0c70a985493b30edda772a39d108743e11b52569bccbb8e5b48a271765fb998d
-
SHA512
7e952a053c54cfd5dcc3854459ac53ccbf56880e4978030f32f55d433f545002683fc1a43a0e0d919f1b8608e84da72c7c1fa0b575171c91ca1d75048bee8934
-
SSDEEP
786432:Ik4FDMyBJdSbNA0Dmrv+XkyxQ+wFyz1thYPATnoYELCw:VkncYTRGyPqoLCw
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1