General
-
Target
setup.msi
-
Size
2.9MB
-
Sample
241202-zxntmaspcy
-
MD5
83f1ae63be7d1bd93e1eac2adcd33298
-
SHA1
730f2aca867722e775f7177798cb7508f9f76a4d
-
SHA256
a4a7e335b5f9590e38f44050cabfebee6f64a2c4b626027f3b7c750e14f5d7fa
-
SHA512
9ad6e20312f8f41cfeaf6243ec4b0b8b501947abc8b74f4e203734ea05eb52a276dab5ab5a9b133061b5066c9bad0d8fd7a422e39b32c3e0799f9fb9641a5a55
-
SSDEEP
49152:i+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:i+lUlz9FKbsodq0YaH7ZPxMb8tT
Behavioral task
behavioral1
Sample
setup.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
setup.msi
-
Size
2.9MB
-
MD5
83f1ae63be7d1bd93e1eac2adcd33298
-
SHA1
730f2aca867722e775f7177798cb7508f9f76a4d
-
SHA256
a4a7e335b5f9590e38f44050cabfebee6f64a2c4b626027f3b7c750e14f5d7fa
-
SHA512
9ad6e20312f8f41cfeaf6243ec4b0b8b501947abc8b74f4e203734ea05eb52a276dab5ab5a9b133061b5066c9bad0d8fd7a422e39b32c3e0799f9fb9641a5a55
-
SSDEEP
49152:i+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:i+lUlz9FKbsodq0YaH7ZPxMb8tT
-
Ateraagent family
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1