Resubmissions

26-01-2021 15:14

210126-1wjb7tm7tj 8

22-01-2021 06:48

210122-lfe2lye8px 8

General

  • Target

    bonif_4778965.doc

  • Size

    81KB

  • Sample

    210122-lfe2lye8px

  • MD5

    f4870c1a4b171f002dc8ea28a974353c

  • SHA1

    5feb29b6f20b663d0bc52ab04dad1cf0abdc8471

  • SHA256

    f9e9a63a33278686754cd9ab810f1b19d429c5de3a43fc71407418dbf4a74977

  • SHA512

    382db2d1c90cd7805b65a1d8d9adf2a944d62589708654eba7bb4833f9e915bf14d8e40e999a572798265cbe08e87e14da48e44e6ffd4ad646f0486aa14ffac0

Score
8/10

Malware Config

Targets

    • Target

      bonif_4778965.doc

    • Size

      81KB

    • MD5

      f4870c1a4b171f002dc8ea28a974353c

    • SHA1

      5feb29b6f20b663d0bc52ab04dad1cf0abdc8471

    • SHA256

      f9e9a63a33278686754cd9ab810f1b19d429c5de3a43fc71407418dbf4a74977

    • SHA512

      382db2d1c90cd7805b65a1d8d9adf2a944d62589708654eba7bb4833f9e915bf14d8e40e999a572798265cbe08e87e14da48e44e6ffd4ad646f0486aa14ffac0

    Score
    5/10
    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks