General
-
Target
5d2922491b47e1c355103194e069e5ac.bin
-
Size
13.7MB
-
Sample
241213-bld82svrdk
-
MD5
fd28eedb73e3a5f0408fd511bdd204b9
-
SHA1
6292ba7a0be47fc40b311de8bf1b5830de3e7032
-
SHA256
c7aea3f26f40402812f54de58368c81ccac2c46ee1c8c009bdfac788cd7256c7
-
SHA512
6fa939905bc66aea9856fb9a3f865131e99fecce31ece4dfce13806132e1744122a271d0b15a490a064fb0f9ee34810e1dac4ba5aa7e7464d3f06adbe4b0d367
-
SSDEEP
196608:qE74v692rWdzLf2C/z/nmorrShDnaWSb1373tbMyKkO+Yvz4YhkORCCdwoyRCbUP:q+x3OC/jdGFS57dbMygPRRp5yAbqE4F
Static task
static1
Behavioral task
behavioral1
Sample
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
-
Size
13.8MB
-
MD5
5d2922491b47e1c355103194e069e5ac
-
SHA1
eb918f926c9cc2f9239f1dfe0380727c8170982c
-
SHA256
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0
-
SHA512
522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9
-
SSDEEP
393216:GDFCbAjiImi73v4JPUQ6Rm1feeuQx1qbvto:GRCbAjCK6PEm12ZQx1qbFo
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1