General
-
Target
PDFpower.exe.7z
-
Size
401KB
-
Sample
230406-vlnx2aea85
-
MD5
8671120cf212d5e7710c3140b4fc15c1
-
SHA1
426be2f69a9b026152144f1ea04684bc0d0bf345
-
SHA256
8aa61b94dce30c94436d8bbadd79a14e073c5911be5b63b93f3739c8baa6aefd
-
SHA512
56367531504b415c54f4bedc811b284b620ac13e62cbd561587365ff9fc7da882952512dc3b5eb313952e783ced70802e3d6a4195a343a0ca71893eb335411e8
-
SSDEEP
12288:cFmuv2J36dAD+SUFoFcSAcM/rgQAquLJOtV:kvGP+zFoFcSAH//uL
Static task
static1
Behavioral task
behavioral1
Sample
PDFpower (4).exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
PDFpower (4).exe
-
Size
1.0MB
-
MD5
1e2a99ae43d6365148d412b5dfee0e1c
-
SHA1
33c02d70abb2f1f12a79cfd780d875a94e7fe877
-
SHA256
e248b01e3ccde76b4d8e8077d4fcb4d0b70e5200bf4e738b45a0bd28fbc2cae6
-
SHA512
d962f2e4bbeee0183a3b75f26ccc6de273c28fe5a191c83c1e4ea6c84c8f70b535273452e05c5e11e4df725cad3054e346ad0b3d98348718a00a350b87a5fa0c
-
SSDEEP
24576:sWjYtbXSRxqO8m657w6ZBLmkitKqBCjC0PDgM5A6:sW8tbiJVV1BCjB
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-