General

  • Target

    bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

  • Size

    809KB

  • Sample

    210513-m5p37xx6ws

  • MD5

    b96f5e57207529e8983cc021e1566450

  • SHA1

    a532859468e0a7e6c1552b7545b2e7084a606953

  • SHA256

    bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

  • SHA512

    8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

Score
8/10

Malware Config

Targets

    • Target

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

    • Size

      809KB

    • MD5

      b96f5e57207529e8983cc021e1566450

    • SHA1

      a532859468e0a7e6c1552b7545b2e7084a606953

    • SHA256

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

    • SHA512

      8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks