General
-
Target
ed0ae67f36657cfe892fb58cc02b28f237ab5de0ed5f8cd902981dc892d7f737.msi
-
Size
2.9MB
-
Sample
241125-dna1hs1mdm
-
MD5
62367ba07bdc8e7abdc94d2bbe076216
-
SHA1
5f0f1c2d77230f41cbb65989f24868a6dc4c9cfc
-
SHA256
ed0ae67f36657cfe892fb58cc02b28f237ab5de0ed5f8cd902981dc892d7f737
-
SHA512
4cd294b23518ac716929eda0061048ca0ca57a93593d9a6d8244b97d9a75b6d0017cba24328c5c5578f9efe5338c103fd18a11beb58f0b5d9a1427c4051fa2a8
-
SSDEEP
49152:u+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:u+lUlz9FKbsodq0YaH7ZPxMb8tT
Behavioral task
behavioral1
Sample
ed0ae67f36657cfe892fb58cc02b28f237ab5de0ed5f8cd902981dc892d7f737.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed0ae67f36657cfe892fb58cc02b28f237ab5de0ed5f8cd902981dc892d7f737.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ed0ae67f36657cfe892fb58cc02b28f237ab5de0ed5f8cd902981dc892d7f737.msi
-
Size
2.9MB
-
MD5
62367ba07bdc8e7abdc94d2bbe076216
-
SHA1
5f0f1c2d77230f41cbb65989f24868a6dc4c9cfc
-
SHA256
ed0ae67f36657cfe892fb58cc02b28f237ab5de0ed5f8cd902981dc892d7f737
-
SHA512
4cd294b23518ac716929eda0061048ca0ca57a93593d9a6d8244b97d9a75b6d0017cba24328c5c5578f9efe5338c103fd18a11beb58f0b5d9a1427c4051fa2a8
-
SSDEEP
49152:u+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:u+lUlz9FKbsodq0YaH7ZPxMb8tT
-
Ateraagent family
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1