General
-
Target
[CV-3] JNT Connect_EN-KO-EN_Law.pdf
-
Size
358KB
-
Sample
220304-gd8etafcdr
-
MD5
b7d3343cb4886594bc2d3c7ca71b526b
-
SHA1
eacf59106b03c3d90c57fdab088d02817d0f2474
-
SHA256
290b2b1428074d556655099a94d8927c012fc1eec177c6d0526060ab62bb2bc9
-
SHA512
c471a4057917c9a300a1a53147bf3131c3ec048637d600001d2fd6971712b72750bd392b80e24bde52c9ad8d202a0ffd1563b767379c2802aec022c7c59d3ef2
Behavioral task
behavioral1
Sample
[CV-3] JNT Connect_EN-KO-EN_Law.pdf
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
[CV-3] JNT Connect_EN-KO-EN_Law.pdf
-
Size
358KB
-
MD5
b7d3343cb4886594bc2d3c7ca71b526b
-
SHA1
eacf59106b03c3d90c57fdab088d02817d0f2474
-
SHA256
290b2b1428074d556655099a94d8927c012fc1eec177c6d0526060ab62bb2bc9
-
SHA512
c471a4057917c9a300a1a53147bf3131c3ec048637d600001d2fd6971712b72750bd392b80e24bde52c9ad8d202a0ffd1563b767379c2802aec022c7c59d3ef2
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-