General
-
Target
PDFpower.exe.7z
-
Size
401KB
-
Sample
230405-yk763abc2v
-
MD5
9ca7d704b1a86e845d636eefe08c1e77
-
SHA1
3e6419b1e597ba61490647be342aa606c91bdf30
-
SHA256
36e83b9b1a106572e2ea34ebff73b2b7e3cf54397f36a8ed2ee15dcac375ea9b
-
SHA512
bebd5f4663ce6b5fde21fc7c08eef6b14d8c8791294ebe99aac8448e1b9059e08628800870a36419b9247611352a841853d2e94efe7280236cb9b353d48ee366
-
SSDEEP
12288:CrcHFwvD8R7l/xCAXbchiFzp0L+LWTH3D4CVuI:UcHFwvD8VXCiQ4Fzc+LWTHT5k
Static task
static1
Behavioral task
behavioral1
Sample
PDFpower.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
PDFpower.exe
-
Size
1.0MB
-
MD5
fb396e6e8b08308f8d12f2776eda4c85
-
SHA1
69d56902ca69fb3486221301b76c67dcbd2d6bf6
-
SHA256
1bd00252035eadae62c03a8396b5b6e3c355082359714d8f02abd9770cb2ef7e
-
SHA512
a0048c628cdd7b3c1ea607e56c0eb4555f53a82d77a1d3cd0c585ca75c45def76bab64012adad8ddb7bcb7465a87dd0ee365fc2e948ca1517e76b07f4be6a32c
-
SSDEEP
24576:sW9Ytb3SRxqO8m657w6ZBLmkitKqBCjC0PDgM5A6:sWWtbCJVV1BCjB
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-