General
-
Target
AdminDroid Office 365 Reporter.exe
-
Size
137.7MB
-
Sample
240906-m2sbdssdjk
-
MD5
25e6e36e73e450305b47b54f8ab24ccf
-
SHA1
bb8936c58174f94dba546175b033865ef6d654f5
-
SHA256
d2a8886cc2574745cc89ee884070bdb732a507317977e19e1744f4e986c3279f
-
SHA512
f53a6edd6e727c9aa176a64acdd5ddbf4e4b30ea2bee6322df34213b4cd6e8b5c9943a048af275c3f677bce2c23940003409f201f59129e780f937c2aff3d901
-
SSDEEP
3145728:DLUf9+TNZM4JzMVTm0IfaLBb5DRDcJ0dwG0+4/dbksaq:DMgNZxtfaLVIJiwGBOIq
Static task
static1
Behavioral task
behavioral1
Sample
AdminDroid Office 365 Reporter.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
AdminDroid Office 365 Reporter.exe
-
Size
137.7MB
-
MD5
25e6e36e73e450305b47b54f8ab24ccf
-
SHA1
bb8936c58174f94dba546175b033865ef6d654f5
-
SHA256
d2a8886cc2574745cc89ee884070bdb732a507317977e19e1744f4e986c3279f
-
SHA512
f53a6edd6e727c9aa176a64acdd5ddbf4e4b30ea2bee6322df34213b4cd6e8b5c9943a048af275c3f677bce2c23940003409f201f59129e780f937c2aff3d901
-
SSDEEP
3145728:DLUf9+TNZM4JzMVTm0IfaLBb5DRDcJ0dwG0+4/dbksaq:DMgNZxtfaLVIJiwGBOIq
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-