General

  • Target

    amneziawg-amd64-1.0.0.msi

  • Size

    3.2MB

  • Sample

    241013-qvnw6sygka

  • MD5

    820f2d66357f5c1d986cbc1a41116d31

  • SHA1

    afc5b70d421b55fc6500698d90f1a4b4a030ce11

  • SHA256

    0f1172401ee28d8bfd15ebd4818e64b6001cd38e04d81ab1d096010eba40c9dc

  • SHA512

    953cc34418782304e121213a64e6de3dc1dc67e96acaf3686f40854c42805f0e12dec8e3ef710b5f00ab195bd4bb16ff1e3ae3413872bc846a0ebbde146bfb62

  • SSDEEP

    49152:DUqcXPxspPbZGfz2qKqmOQKsGc28k0aAfCWop2RYmVXbnD2mNoRv:wpXcDMfz2qtmOGGcjdy2OfYo

Malware Config

Targets

    • Target

      amneziawg-amd64-1.0.0.msi

    • Size

      3.2MB

    • MD5

      820f2d66357f5c1d986cbc1a41116d31

    • SHA1

      afc5b70d421b55fc6500698d90f1a4b4a030ce11

    • SHA256

      0f1172401ee28d8bfd15ebd4818e64b6001cd38e04d81ab1d096010eba40c9dc

    • SHA512

      953cc34418782304e121213a64e6de3dc1dc67e96acaf3686f40854c42805f0e12dec8e3ef710b5f00ab195bd4bb16ff1e3ae3413872bc846a0ebbde146bfb62

    • SSDEEP

      49152:DUqcXPxspPbZGfz2qKqmOQKsGc28k0aAfCWop2RYmVXbnD2mNoRv:wpXcDMfz2qtmOGGcjdy2OfYo

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks