General

  • Target

    AdminDroid Office 365 Reporter.exe

  • Size

    137.7MB

  • Sample

    240906-m2sbdssdjk

  • MD5

    25e6e36e73e450305b47b54f8ab24ccf

  • SHA1

    bb8936c58174f94dba546175b033865ef6d654f5

  • SHA256

    d2a8886cc2574745cc89ee884070bdb732a507317977e19e1744f4e986c3279f

  • SHA512

    f53a6edd6e727c9aa176a64acdd5ddbf4e4b30ea2bee6322df34213b4cd6e8b5c9943a048af275c3f677bce2c23940003409f201f59129e780f937c2aff3d901

  • SSDEEP

    3145728:DLUf9+TNZM4JzMVTm0IfaLBb5DRDcJ0dwG0+4/dbksaq:DMgNZxtfaLVIJiwGBOIq

Score
7/10

Malware Config

Targets

    • Target

      AdminDroid Office 365 Reporter.exe

    • Size

      137.7MB

    • MD5

      25e6e36e73e450305b47b54f8ab24ccf

    • SHA1

      bb8936c58174f94dba546175b033865ef6d654f5

    • SHA256

      d2a8886cc2574745cc89ee884070bdb732a507317977e19e1744f4e986c3279f

    • SHA512

      f53a6edd6e727c9aa176a64acdd5ddbf4e4b30ea2bee6322df34213b4cd6e8b5c9943a048af275c3f677bce2c23940003409f201f59129e780f937c2aff3d901

    • SSDEEP

      3145728:DLUf9+TNZM4JzMVTm0IfaLBb5DRDcJ0dwG0+4/dbksaq:DMgNZxtfaLVIJiwGBOIq

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks