General
-
Target
TMmap_x1.0.4.4_D24.48.msi
-
Size
55.9MB
-
Sample
250328-l4anpavsay
-
MD5
25258c327b220ef38c6c094fb8f2c002
-
SHA1
3b9e36c0f290a0a56ff868dc7796601c4c800d28
-
SHA256
012df00a6c8445074efa5c68506965c652c5ba4a5c3108bb80e7ae832e423ff6
-
SHA512
77a7c11879d9955fb27a9caf7685d425b5604566f248f335042942fbf3f6b9db9006bfd6761796a3bf2ab8ceb24290d8276dac6c2d1b7675c9090ea92c202a13
-
SSDEEP
1572864:BD0yC8/alZeUUtMqe0CUTN6bZ2ctu777VMT4I8SSS7oEIT+Yu:BDz/alZ9Uk5UTNktuPZMT4IAPEHx
Static task
static1
Behavioral task
behavioral1
Sample
TMmap_x1.0.4.4_D24.48.msi
Resource
win11-20250313-uk
Malware Config
Targets
-
-
Target
TMmap_x1.0.4.4_D24.48.msi
-
Size
55.9MB
-
MD5
25258c327b220ef38c6c094fb8f2c002
-
SHA1
3b9e36c0f290a0a56ff868dc7796601c4c800d28
-
SHA256
012df00a6c8445074efa5c68506965c652c5ba4a5c3108bb80e7ae832e423ff6
-
SHA512
77a7c11879d9955fb27a9caf7685d425b5604566f248f335042942fbf3f6b9db9006bfd6761796a3bf2ab8ceb24290d8276dac6c2d1b7675c9090ea92c202a13
-
SSDEEP
1572864:BD0yC8/alZeUUtMqe0CUTN6bZ2ctu777VMT4I8SSS7oEIT+Yu:BDz/alZ9Uk5UTNktuPZMT4IAPEHx
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1