General

  • Target

    PDFpower.exe.7z

  • Size

    401KB

  • Sample

    230406-vlnx2aea85

  • MD5

    8671120cf212d5e7710c3140b4fc15c1

  • SHA1

    426be2f69a9b026152144f1ea04684bc0d0bf345

  • SHA256

    8aa61b94dce30c94436d8bbadd79a14e073c5911be5b63b93f3739c8baa6aefd

  • SHA512

    56367531504b415c54f4bedc811b284b620ac13e62cbd561587365ff9fc7da882952512dc3b5eb313952e783ced70802e3d6a4195a343a0ca71893eb335411e8

  • SSDEEP

    12288:cFmuv2J36dAD+SUFoFcSAcM/rgQAquLJOtV:kvGP+zFoFcSAH//uL

Score
6/10

Malware Config

Targets

    • Target

      PDFpower (4).exe

    • Size

      1.0MB

    • MD5

      1e2a99ae43d6365148d412b5dfee0e1c

    • SHA1

      33c02d70abb2f1f12a79cfd780d875a94e7fe877

    • SHA256

      e248b01e3ccde76b4d8e8077d4fcb4d0b70e5200bf4e738b45a0bd28fbc2cae6

    • SHA512

      d962f2e4bbeee0183a3b75f26ccc6de273c28fe5a191c83c1e4ea6c84c8f70b535273452e05c5e11e4df725cad3054e346ad0b3d98348718a00a350b87a5fa0c

    • SSDEEP

      24576:sWjYtbXSRxqO8m657w6ZBLmkitKqBCjC0PDgM5A6:sW8tbiJVV1BCjB

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks