General
-
Target
5ab049b4cd81fba59e194535ddc11a677fa64809b86967138c370d026009e523
-
Size
80KB
-
Sample
220521-m8vp4adcd2
-
MD5
5f081285b1fbfa8bceb3898b666c8a22
-
SHA1
b9c9872695d820c8ba16f22cb3989820f8ea46a5
-
SHA256
5ab049b4cd81fba59e194535ddc11a677fa64809b86967138c370d026009e523
-
SHA512
4dffbdeebe6c24b501d1604a98bf34b2fb8f8a7e17927e6ab03dbb454cf16d569c2e701d4e563653f473061f11ade4a25d3949cf4b06268b4e72c1565e4faa36
Behavioral task
behavioral1
Sample
utente_5372.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
utente_5372.xls
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://link.rolandchase.com/setup.exe
Targets
-
-
Target
utente_5372.xls
-
Size
182KB
-
MD5
d2dd670679bf058c5f1d54698c06a1ae
-
SHA1
78da270912f7caf709bfe33b7b11f26c0b1c8b32
-
SHA256
a5b085ab8fb0c399b94ee37ecd7770c3c54b41f5f3c430da6fae572c6c39f7bd
-
SHA512
fdc6a3fddf55efe011fc7f6bb839ca43db9c521b91cb87ce7d95473938f23eda7543e07c3240cb42f90223f28e725ddf844a7f87077372d87a7dad44494c2f20
Score10/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-