General

  • Target

    reinforce.pdf

  • Size

    122KB

  • Sample

    210122-td75lgf7yx

  • MD5

    832a8384b48dac0a637235ed4b2bfc51

  • SHA1

    62fc55df08b08a16eec15b69fef0231b00866c2b

  • SHA256

    3ecb030e3def69641cf09761bbceb3e6df50ccd0830139cabdac09fd4669e0e5

  • SHA512

    8a762b6b53501f362fee617bc39d9bd3a043dff8e24ae9d4bdd2984499f5dd05d86736be6ac13c8112f2ca044c808e82ba3484fef80fa78657ee0371d66e2b4d

Score
5/10

Malware Config

Targets

    • Target

      reinforce.pdf

    • Size

      122KB

    • MD5

      832a8384b48dac0a637235ed4b2bfc51

    • SHA1

      62fc55df08b08a16eec15b69fef0231b00866c2b

    • SHA256

      3ecb030e3def69641cf09761bbceb3e6df50ccd0830139cabdac09fd4669e0e5

    • SHA512

      8a762b6b53501f362fee617bc39d9bd3a043dff8e24ae9d4bdd2984499f5dd05d86736be6ac13c8112f2ca044c808e82ba3484fef80fa78657ee0371d66e2b4d

    Score
    5/10
    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks