General
-
Target
64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi
-
Size
52.9MB
-
Sample
250128-md8y8swkar
-
MD5
dee1cb66fe01d38563456233fd99f84e
-
SHA1
2dc8c5665574ca781d0deb31e9cfa326b4589340
-
SHA256
64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5
-
SHA512
04a731d29388c1bade0d9f3839588e15621d7ad2daa1db290ae1c1947a72ab2176dcbf5dfd79702e602eccb29a981a363eb64821fc586f468bda7cfe3130e1dc
-
SSDEEP
1572864:cP0B9hWc38EJOa1xbi+823n84w96uSryj6ZgykS+VOT:A0ThnBJi+82384e6uSryml+IT
Static task
static1
Behavioral task
behavioral1
Sample
64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi
-
Size
52.9MB
-
MD5
dee1cb66fe01d38563456233fd99f84e
-
SHA1
2dc8c5665574ca781d0deb31e9cfa326b4589340
-
SHA256
64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5
-
SHA512
04a731d29388c1bade0d9f3839588e15621d7ad2daa1db290ae1c1947a72ab2176dcbf5dfd79702e602eccb29a981a363eb64821fc586f468bda7cfe3130e1dc
-
SSDEEP
1572864:cP0B9hWc38EJOa1xbi+823n84w96uSryj6ZgykS+VOT:A0ThnBJi+82384e6uSryml+IT
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
SectopRAT payload
-
Sectoprat family
-
Drops startup file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2