General
-
Target
msi (2).msi
-
Size
36.3MB
-
Sample
250409-qe1k2a1l19
-
MD5
dcbf686b0fc80544638f8366a856f1ab
-
SHA1
5b0b9433bb363fa6a9857722cc26fbc81cf05705
-
SHA256
f153131a0345003fb62ab55701fc0a353640d21b0bc0b52a55270785f9106365
-
SHA512
c0e03b3a5ce2c2b86f3984f65bd2968e433c54025dec1b1cbabe0e186ecd4c068178828be8dfbfaedfdbf53c90d817221afa65724259091031b12ae37be7ca0c
-
SSDEEP
393216:kDVtSjY/hI/kmWsC3Jpn+JSOCat4v8a970ODg0fw4d7FubFtoRhdPRB48XP:MVhFJbaFOD44QxtondPZ
Malware Config
Extracted
hijackloader
-
directory
%APPDATA%\UltraNotepad_alpha
-
inject_dll
%windir%\SysWOW64\pla.dll
Targets
-
-
Target
msi (2).msi
-
Size
36.3MB
-
MD5
dcbf686b0fc80544638f8366a856f1ab
-
SHA1
5b0b9433bb363fa6a9857722cc26fbc81cf05705
-
SHA256
f153131a0345003fb62ab55701fc0a353640d21b0bc0b52a55270785f9106365
-
SHA512
c0e03b3a5ce2c2b86f3984f65bd2968e433c54025dec1b1cbabe0e186ecd4c068178828be8dfbfaedfdbf53c90d817221afa65724259091031b12ae37be7ca0c
-
SSDEEP
393216:kDVtSjY/hI/kmWsC3Jpn+JSOCat4v8a970ODg0fw4d7FubFtoRhdPRB48XP:MVhFJbaFOD44QxtondPZ
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1