General

  • Target

    13,pdf.ppam

  • Size

    8KB

  • Sample

    210810-mrpgqgz42x

  • MD5

    442e555300c8fc9f23d2541b50cd5683

  • SHA1

    44ced2fda2806966ac9cb596959d75c9da9929f6

  • SHA256

    670e6cfe8ffded59575d5770f5685f2be005bd4352a9687b860282d4258a4cf7

  • SHA512

    dd30dd89e8cbeace09434827799aef747b747bb83315d746ce8410da34620a6bac35981ff02c86d3dbd51ce9801b8d9a610290ac3c7c2b1fe9497614e67d5a26

Score
8/10

Malware Config

Targets

    • Target

      13,pdf.ppam

    • Size

      8KB

    • MD5

      442e555300c8fc9f23d2541b50cd5683

    • SHA1

      44ced2fda2806966ac9cb596959d75c9da9929f6

    • SHA256

      670e6cfe8ffded59575d5770f5685f2be005bd4352a9687b860282d4258a4cf7

    • SHA512

      dd30dd89e8cbeace09434827799aef747b747bb83315d746ce8410da34620a6bac35981ff02c86d3dbd51ce9801b8d9a610290ac3c7c2b1fe9497614e67d5a26

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks