General
-
Target
NovaLauncher_44dc2817f4e85757cc52784cd3521c67.msi
-
Size
7.1MB
-
Sample
241127-df4b4atlgt
-
MD5
44dc2817f4e85757cc52784cd3521c67
-
SHA1
41fc684fdb5331b3bc0a6a48f0903c530e3ff054
-
SHA256
4a0a4a787586fbc370a2721019013e158a88d5c5f78fd140c91b54af42103763
-
SHA512
66215cc9fb92c7ec5c9fdbe85df9a98bfb72cdfb48e8db51c4ea9bcbd22ff784d57313dea9a6a0a1ee98852d52bec455ad8983e15cab9cd163cbb136ed0f2d18
-
SSDEEP
196608:OdVx9BJKK09BYzW+ZUl4sK8bF/9NH5iPbPO:OdVx9s9BYzw4sK8bF/aTO
Static task
static1
Behavioral task
behavioral1
Sample
NovaLauncher_44dc2817f4e85757cc52784cd3521c67.msi
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
NovaLauncher_44dc2817f4e85757cc52784cd3521c67.msi
-
Size
7.1MB
-
MD5
44dc2817f4e85757cc52784cd3521c67
-
SHA1
41fc684fdb5331b3bc0a6a48f0903c530e3ff054
-
SHA256
4a0a4a787586fbc370a2721019013e158a88d5c5f78fd140c91b54af42103763
-
SHA512
66215cc9fb92c7ec5c9fdbe85df9a98bfb72cdfb48e8db51c4ea9bcbd22ff784d57313dea9a6a0a1ee98852d52bec455ad8983e15cab9cd163cbb136ed0f2d18
-
SSDEEP
196608:OdVx9BJKK09BYzW+ZUl4sK8bF/9NH5iPbPO:OdVx9s9BYzw4sK8bF/aTO
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-