General
-
Target
setup.msi
-
Size
2.9MB
-
Sample
241202-yaj2gsypet
-
MD5
4778656f55c3c386160a9f706a6b70db
-
SHA1
71240aee704a89d9c97b475f4938289740fe7a82
-
SHA256
89b67e3750fa7d7bc014ea4906ed2252bc2b4ce91cb46b3cc809f216c6c38dbd
-
SHA512
a00f9e47929939784604dd3b191f08df893a226b2483b6508506f4de1529c34e7c80402e507e4e4f6203417b74478deffd7d228c97ee3377cb96875d514e6821
-
SSDEEP
49152:F+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:F+lUlz9FKbsodq0YaH7ZPxMb8tT
Behavioral task
behavioral1
Sample
setup.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
setup.msi
-
Size
2.9MB
-
MD5
4778656f55c3c386160a9f706a6b70db
-
SHA1
71240aee704a89d9c97b475f4938289740fe7a82
-
SHA256
89b67e3750fa7d7bc014ea4906ed2252bc2b4ce91cb46b3cc809f216c6c38dbd
-
SHA512
a00f9e47929939784604dd3b191f08df893a226b2483b6508506f4de1529c34e7c80402e507e4e4f6203417b74478deffd7d228c97ee3377cb96875d514e6821
-
SSDEEP
49152:F+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:F+lUlz9FKbsodq0YaH7ZPxMb8tT
-
Ateraagent family
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1