General

  • Target

    summer.pdf

  • Size

    185KB

  • Sample

    210122-g9ffh3nsdx

  • MD5

    d2998394eb9e45d8a24cbcf559dcea20

  • SHA1

    4becd9c9c93d4a107e11e218c0bad0fceeed144b

  • SHA256

    530df6b3cc251bec06b7abe2c7f07fac3c449952dd02009ea656e950d97132d4

  • SHA512

    046e627ada405c5ba3c65f8882b985f15221fec773009165d1bfc54c3cd47ceadadc2950642de841e1f01e3f93bf030f86382e71ea3f51c25df66cb6ba20a707

Score
5/10

Malware Config

Targets

    • Target

      summer.pdf

    • Size

      185KB

    • MD5

      d2998394eb9e45d8a24cbcf559dcea20

    • SHA1

      4becd9c9c93d4a107e11e218c0bad0fceeed144b

    • SHA256

      530df6b3cc251bec06b7abe2c7f07fac3c449952dd02009ea656e950d97132d4

    • SHA512

      046e627ada405c5ba3c65f8882b985f15221fec773009165d1bfc54c3cd47ceadadc2950642de841e1f01e3f93bf030f86382e71ea3f51c25df66cb6ba20a707

    Score
    5/10
    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks