General
-
Target
c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4
-
Size
2.6MB
-
Sample
241202-tzrqeaskaw
-
MD5
1e9a4e774b61acc8a6b35ee50417e661
-
SHA1
b7522d2f1fb7b9b92348b4d88c62480683d3485c
-
SHA256
c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4
-
SHA512
e41ddf5aae8d4354773a7787344c6e4c4b229e39664d10eb4e9ac5c325ab92f716663c841d782a98b93e7a6cb5f236c84a6d503d6a5e33071aefd0996faa836c
-
SSDEEP
49152:d51VAM5R2KAHlcp8qFmmzDza2Rqr+kMdPTEe/pjO8xn+ch/TlOFNOnUI:dPCMr2NMRmk/XeM9TEeRvx+ch/TlAr
Behavioral task
behavioral1
Sample
c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4
-
Size
2.6MB
-
MD5
1e9a4e774b61acc8a6b35ee50417e661
-
SHA1
b7522d2f1fb7b9b92348b4d88c62480683d3485c
-
SHA256
c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4
-
SHA512
e41ddf5aae8d4354773a7787344c6e4c4b229e39664d10eb4e9ac5c325ab92f716663c841d782a98b93e7a6cb5f236c84a6d503d6a5e33071aefd0996faa836c
-
SSDEEP
49152:d51VAM5R2KAHlcp8qFmmzDza2Rqr+kMdPTEe/pjO8xn+ch/TlOFNOnUI:dPCMr2NMRmk/XeM9TEeRvx+ch/TlAr
-
Ateraagent family
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1