General

  • Target

    Nefarius_DsHidMini_Drivers_x64_arm64_v3.5.1.msi

  • Size

    17.2MB

  • Sample

    250120-k3kxla1res

  • MD5

    a86c0cb5c3f36cbc15f2589a0ab0b08f

  • SHA1

    2f47ec4cd9bca1ee7add56a96cc16ec00a9e1928

  • SHA256

    77295683e2ba57adf91afc54701c46f06a7a847f3621b15f2acfa7ea914fcf26

  • SHA512

    57316d2f849dd0d140e26a2ce2b59a554cdecb90c3885b3f299469eca6390ecc4c74637137146ba5a0670da25d3af4651a190d7ac9c2ca0ace56dbe0ea9087b2

  • SSDEEP

    393216:cQPyqsHIqm1mJR4MjqESRhJKz9//f13N1Ds+:cQPxkIzs5qECP2Frs

Malware Config

Targets

    • Target

      Nefarius_DsHidMini_Drivers_x64_arm64_v3.5.1.msi

    • Size

      17.2MB

    • MD5

      a86c0cb5c3f36cbc15f2589a0ab0b08f

    • SHA1

      2f47ec4cd9bca1ee7add56a96cc16ec00a9e1928

    • SHA256

      77295683e2ba57adf91afc54701c46f06a7a847f3621b15f2acfa7ea914fcf26

    • SHA512

      57316d2f849dd0d140e26a2ce2b59a554cdecb90c3885b3f299469eca6390ecc4c74637137146ba5a0670da25d3af4651a190d7ac9c2ca0ace56dbe0ea9087b2

    • SSDEEP

      393216:cQPyqsHIqm1mJR4MjqESRhJKz9//f13N1Ds+:cQPxkIzs5qECP2Frs

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks