General
-
Target
summer.pdf
-
Size
185KB
-
Sample
210122-g9ffh3nsdx
-
MD5
d2998394eb9e45d8a24cbcf559dcea20
-
SHA1
4becd9c9c93d4a107e11e218c0bad0fceeed144b
-
SHA256
530df6b3cc251bec06b7abe2c7f07fac3c449952dd02009ea656e950d97132d4
-
SHA512
046e627ada405c5ba3c65f8882b985f15221fec773009165d1bfc54c3cd47ceadadc2950642de841e1f01e3f93bf030f86382e71ea3f51c25df66cb6ba20a707
Behavioral task
behavioral1
Sample
summer.pdf
Resource
win7v20201028
Behavioral task
behavioral2
Sample
summer.pdf
Resource
win10v20201028
Malware Config
Targets
-
-
Target
summer.pdf
-
Size
185KB
-
MD5
d2998394eb9e45d8a24cbcf559dcea20
-
SHA1
4becd9c9c93d4a107e11e218c0bad0fceeed144b
-
SHA256
530df6b3cc251bec06b7abe2c7f07fac3c449952dd02009ea656e950d97132d4
-
SHA512
046e627ada405c5ba3c65f8882b985f15221fec773009165d1bfc54c3cd47ceadadc2950642de841e1f01e3f93bf030f86382e71ea3f51c25df66cb6ba20a707
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-