General

  • Target

    TMmap_1.0.4.4_D24.48.zip

  • Size

    53.8MB

  • Sample

    250328-lzrfmst1ht

  • MD5

    0c53be896e640313be639c2ba0e69237

  • SHA1

    b60dc041d45ab85026d166abc075ddc0c3052d57

  • SHA256

    9d40631b4eecec5c3fc3bc005718b01d71cd5584aa433b1248732f8cd2b223ac

  • SHA512

    b27e04061800d40edc118a0796a65113c03999bda250cb42986226685abcee947e056553c16791189c243dc256927e0ffb755ad06c374b1ae0014c5423f6a5be

  • SSDEEP

    1572864:07nZxYyTz+GVCjEoPkAGZb6jOhTQ4Bl6K:uxYyT9QGZr9Q4qK

Malware Config

Targets

    • Target

      TMmap_1.0.4.4_D24.48.zip

    • Size

      53.8MB

    • MD5

      0c53be896e640313be639c2ba0e69237

    • SHA1

      b60dc041d45ab85026d166abc075ddc0c3052d57

    • SHA256

      9d40631b4eecec5c3fc3bc005718b01d71cd5584aa433b1248732f8cd2b223ac

    • SHA512

      b27e04061800d40edc118a0796a65113c03999bda250cb42986226685abcee947e056553c16791189c243dc256927e0ffb755ad06c374b1ae0014c5423f6a5be

    • SSDEEP

      1572864:07nZxYyTz+GVCjEoPkAGZb6jOhTQ4Bl6K:uxYyT9QGZr9Q4qK

    Score
    1/10
    • Target

      TMmap_1.0.4.4_D24.48/Readme.txt

    • Size

      786B

    • MD5

      7540058863168bb76926d5b7d81daaac

    • SHA1

      a060c908439111ac23f6a069da1d5b06b4687a59

    • SHA256

      2c3f27ef0130aa71613707cb398a26493c4679d4c4235f7c3b283a529b17a9b1

    • SHA512

      c44fdf2933b72d7debe226bab46168bc77cf6d63c537480a637058240943fe0dfb3659517720e592202fc21760dc30e3c61b74883ed51d9eeff88b8b51e51088

    Score
    3/10
    • Target

      TMmap_1.0.4.4_D24.48/TMSoft.TMMAP-DEMO_AjrQSf7iMI.key

    • Size

      112B

    • MD5

      64f1db85fb5fc7d4bca84553f0db07fc

    • SHA1

      7d007d6e797ac4ada6c8a581b18961cf1ccbbffd

    • SHA256

      ea9c7be2c21b6fc5d3fb5f0fc8f4e965c42352d94fa2248785ccb5ee857ac423

    • SHA512

      f5cacbfd91b783dc486e645cfa15030df589bdcfad214e5665402169181dec617ca02499d9dfd7b97db50399fc76fc06d206421a4ec261a8b6eb6ac68d570f39

    Score
    3/10
    • Target

      TMmap_1.0.4.4_D24.48/TMmap_x1.0.4.4_D24.48.msi

    • Size

      55.9MB

    • MD5

      25258c327b220ef38c6c094fb8f2c002

    • SHA1

      3b9e36c0f290a0a56ff868dc7796601c4c800d28

    • SHA256

      012df00a6c8445074efa5c68506965c652c5ba4a5c3108bb80e7ae832e423ff6

    • SHA512

      77a7c11879d9955fb27a9caf7685d425b5604566f248f335042942fbf3f6b9db9006bfd6761796a3bf2ab8ceb24290d8276dac6c2d1b7675c9090ea92c202a13

    • SSDEEP

      1572864:BD0yC8/alZeUUtMqe0CUTN6bZ2ctu777VMT4I8SSS7oEIT+Yu:BDz/alZ9Uk5UTNktuPZMT4IAPEHx

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks