Allegato_doc_02613440060.vbs

General
Target

Allegato_doc_02613440060.vbs

Size

8KB

Sample

210111-63kw6gpz7j

Score
10 /10
MD5

6266da42dda2a91e97c63181b85b26d4

SHA1

2a0673cc7ea00b5187dac046b906aa1018317236

SHA256

12bad94c43427bae4e3855ebdd60d32d7a6305f108a811ead926950450ec503b

SHA512

fed5ca3e0b5f2214d12c6e8e6d86b6f96589e4629a588bb91cb3df90e3f20c17bb0413f9cbc1683a64642a5b2aa1ddc3ce2a59bb674febe28676c5a5157913c6

Malware Config
Targets
Target

Allegato_doc_02613440060.vbs

MD5

6266da42dda2a91e97c63181b85b26d4

Filesize

8KB

Score
10 /10
SHA1

2a0673cc7ea00b5187dac046b906aa1018317236

SHA256

12bad94c43427bae4e3855ebdd60d32d7a6305f108a811ead926950450ec503b

SHA512

fed5ca3e0b5f2214d12c6e8e6d86b6f96589e4629a588bb91cb3df90e3f20c17bb0413f9cbc1683a64642a5b2aa1ddc3ce2a59bb674febe28676c5a5157913c6

Tags

Signatures

  • sLoad

    Description

    sLoad is a PowerShell downloader that can exfiltrate system information and deliver additional payloads.

    Tags

  • Executes dropped EXE

  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Tasks

                        static1

                        behavioral1

                        10/10

                        behavioral2

                        10/10