General

  • Target

    2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

  • Size

    722KB

  • Sample

    210508-rpzqgy2h1a

  • MD5

    f59685a74da27f107abd2212bb291af4

  • SHA1

    2741e93fe708923a9634fc003207192e1fa81515

  • SHA256

    2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

  • SHA512

    86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

Score
8/10

Malware Config

Targets

    • Target

      2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

    • Size

      722KB

    • MD5

      f59685a74da27f107abd2212bb291af4

    • SHA1

      2741e93fe708923a9634fc003207192e1fa81515

    • SHA256

      2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

    • SHA512

      86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks