General
-
Target
da82405461ea618b47cb324573fcf7c778ca56ad34ada7529b520f0ab51c3a5d.msi
-
Size
2.9MB
-
Sample
241220-hfg63ssrhq
-
MD5
69a1ca360930e2d7e7e11fe55cdd5120
-
SHA1
04f37a7b9c2033e529074f4ffd4883e00746cdcb
-
SHA256
da82405461ea618b47cb324573fcf7c778ca56ad34ada7529b520f0ab51c3a5d
-
SHA512
74c1ee8ee9e80f660de6d36c0ffbefa89d1142a0b8d2d1b70dd280900752b824a996aa0875509c8eaacd9b1c4f85c427f7dbaa8fcfd3adf1c5e7022ad99f1821
-
SSDEEP
49152:2+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:2+lUlz9FKbsodq0YaH7ZPxMb8tT
Behavioral task
behavioral1
Sample
da82405461ea618b47cb324573fcf7c778ca56ad34ada7529b520f0ab51c3a5d.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da82405461ea618b47cb324573fcf7c778ca56ad34ada7529b520f0ab51c3a5d.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
da82405461ea618b47cb324573fcf7c778ca56ad34ada7529b520f0ab51c3a5d.msi
-
Size
2.9MB
-
MD5
69a1ca360930e2d7e7e11fe55cdd5120
-
SHA1
04f37a7b9c2033e529074f4ffd4883e00746cdcb
-
SHA256
da82405461ea618b47cb324573fcf7c778ca56ad34ada7529b520f0ab51c3a5d
-
SHA512
74c1ee8ee9e80f660de6d36c0ffbefa89d1142a0b8d2d1b70dd280900752b824a996aa0875509c8eaacd9b1c4f85c427f7dbaa8fcfd3adf1c5e7022ad99f1821
-
SSDEEP
49152:2+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:2+lUlz9FKbsodq0YaH7ZPxMb8tT
-
Ateraagent family
-
Detects AteraAgent
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1