General

  • Target

    TMmap_x1.0.4.4_D24.48.msi

  • Size

    55.9MB

  • Sample

    250328-l4anpavsay

  • MD5

    25258c327b220ef38c6c094fb8f2c002

  • SHA1

    3b9e36c0f290a0a56ff868dc7796601c4c800d28

  • SHA256

    012df00a6c8445074efa5c68506965c652c5ba4a5c3108bb80e7ae832e423ff6

  • SHA512

    77a7c11879d9955fb27a9caf7685d425b5604566f248f335042942fbf3f6b9db9006bfd6761796a3bf2ab8ceb24290d8276dac6c2d1b7675c9090ea92c202a13

  • SSDEEP

    1572864:BD0yC8/alZeUUtMqe0CUTN6bZ2ctu777VMT4I8SSS7oEIT+Yu:BDz/alZ9Uk5UTNktuPZMT4IAPEHx

Malware Config

Targets

    • Target

      TMmap_x1.0.4.4_D24.48.msi

    • Size

      55.9MB

    • MD5

      25258c327b220ef38c6c094fb8f2c002

    • SHA1

      3b9e36c0f290a0a56ff868dc7796601c4c800d28

    • SHA256

      012df00a6c8445074efa5c68506965c652c5ba4a5c3108bb80e7ae832e423ff6

    • SHA512

      77a7c11879d9955fb27a9caf7685d425b5604566f248f335042942fbf3f6b9db9006bfd6761796a3bf2ab8ceb24290d8276dac6c2d1b7675c9090ea92c202a13

    • SSDEEP

      1572864:BD0yC8/alZeUUtMqe0CUTN6bZ2ctu777VMT4I8SSS7oEIT+Yu:BDz/alZ9Uk5UTNktuPZMT4IAPEHx

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks