General

  • Target

    c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi

  • Size

    13.8MB

  • Sample

    241212-c67xjaslep

  • MD5

    5d2922491b47e1c355103194e069e5ac

  • SHA1

    eb918f926c9cc2f9239f1dfe0380727c8170982c

  • SHA256

    c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0

  • SHA512

    522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9

  • SSDEEP

    393216:GDFCbAjiImi73v4JPUQ6Rm1feeuQx1qbvto:GRCbAjCK6PEm12ZQx1qbFo

Malware Config

Targets

    • Target

      c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi

    • Size

      13.8MB

    • MD5

      5d2922491b47e1c355103194e069e5ac

    • SHA1

      eb918f926c9cc2f9239f1dfe0380727c8170982c

    • SHA256

      c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0

    • SHA512

      522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9

    • SSDEEP

      393216:GDFCbAjiImi73v4JPUQ6Rm1feeuQx1qbvto:GRCbAjCK6PEm12ZQx1qbFo

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks