General

  • Target

    Apache_OpenOffice_4.1.15_Win_x86_install_es.exe

  • Size

    125.6MB

  • Sample

    250122-sptxcatlgn

  • MD5

    bbe59728aaa6b2647abce7d07c14417d

  • SHA1

    0cd604617b54550b236acba507202ef1531e78bc

  • SHA256

    bbdf4c8d657e3123bd009ab086758bfd707f9b8c7f5fabb22783c4cb81784ca8

  • SHA512

    eb3db0f8543c58c7882b20f995aa28981297af5ac00a3fe00ac7f704897efd16125edf3739dfc28c4151477ccb0fc23bc1ff4ac69de41ce58c25d0f0df2f4c11

  • SSDEEP

    3145728:5GHXeD6lphGi7zgp0Jub3DUAAGaSNl3+MeWXi3Fmqa:c3zlpbzW0JubwI7+lii3sB

Malware Config

Targets

    • Target

      Apache_OpenOffice_4.1.15_Win_x86_install_es.exe

    • Size

      125.6MB

    • MD5

      bbe59728aaa6b2647abce7d07c14417d

    • SHA1

      0cd604617b54550b236acba507202ef1531e78bc

    • SHA256

      bbdf4c8d657e3123bd009ab086758bfd707f9b8c7f5fabb22783c4cb81784ca8

    • SHA512

      eb3db0f8543c58c7882b20f995aa28981297af5ac00a3fe00ac7f704897efd16125edf3739dfc28c4151477ccb0fc23bc1ff4ac69de41ce58c25d0f0df2f4c11

    • SSDEEP

      3145728:5GHXeD6lphGi7zgp0Jub3DUAAGaSNl3+MeWXi3Fmqa:c3zlpbzW0JubwI7+lii3sB

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Target

      $PLUGINSDIR/InstallOptions.dll

    • Size

      15KB

    • MD5

      d095b082b7c5ba4665d40d9c5042af6d

    • SHA1

      2220277304af105ca6c56219f56f04e894b28d27

    • SHA256

      b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c

    • SHA512

      61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9

    • SSDEEP

      192:EyGQtZkTktEQUrJaZfuyCnSmUsv3sY7L7cW8Y6Q86QvoTr11929WtshLAzgSrX8:EyNt+4t7uJalUnGesY7Lt8nCr/Yosa

    Score
    3/10
    • Target

      stat.py

    • Size

      1KB

    • MD5

      0f443c15753459fc012f1c68fdd810dc

    • SHA1

      0f52e7aa4804852dc2bb4944949695b8047807ab

    • SHA256

      0b6cc8ca3b5e038eb02eb0e8299b01c9b27b51b45a5df621a426544b3d046d5f

    • SHA512

      6fef490e8a9ffe654cdfd98569c213ad4cee8c97709fda48d307f1ced205041b1415f0e55022481acb8161fb2c2049222eba1527201dbc3f258b1e4e4bdef43e

    Score
    3/10
    • Target

      stats.py

    • Size

      2KB

    • MD5

      88cce69b140c972f39bca2fc0a56a24b

    • SHA1

      d1dab86b6d06f884282fc660c02d6d3b366b04f9

    • SHA256

      7143248621b97d934a8b32e898fe1146d525b0ff609ee2b2e78610b7692efa64

    • SHA512

      555abfd97bd65e0d8b9a6bffebd6978b291e28ca60abe00b15a5f2838a81d9042c34bb1d3f32e3b69f996028962a1ddcc0cc95a1465f9053cdf5a0d09ab514ed

    Score
    3/10
    • Target

      statvfs.py

    • Size

      898B

    • MD5

      4a3b595742f7c441d8fbbd1cded2fa1d

    • SHA1

      9355dc67a61507bbf5e7a66dc05b6b1adb0f8506

    • SHA256

      4ccf280dab73868ce5bbe1f7e146ef8acf2c189a77eb054ec5b7fbcee73dbd9d

    • SHA512

      a6fc90ffbaa5665a9858aca59ace19cf66991817130085fa9116e5907e948b6897aaa0d46c7790046e71f17226e23d81d50032dd151930b2b3d557f188bc5a93

    Score
    3/10
    • Target

      stl_01.ott

    • Size

      37KB

    • MD5

      81ac2d7b648026ae4b5e95be2d77d406

    • SHA1

      3bcdf3032251990f65c98ab0f0c1ca790597660d

    • SHA256

      df36adf98577de3c41852c764fe079532f4f0bbeb0a1ab402b421f4906c5c296

    • SHA512

      f9aacf9e6d584843d5302039799b0a7428c4672fb1d1e0c324ef8e7aa5111c4e8bd2fe3ff727513465b9399bdfcba50ead0dd295c442dd45e07a5d5bfe241898

    • SSDEEP

      768:B1hTSkAsTUWid5KauiNpDnE9N10zNbX3pGlHdoN40UiZ:B1hT5IWid5pVs10z1ySUy

    Score
    3/10
    • Target

      stl_02.ott

    • Size

      24KB

    • MD5

      0e7e64af741107a5ba687fae2f6c1c42

    • SHA1

      d4036f4a3e04c0ea7755ea9eb066e1bf5c23c10c

    • SHA256

      874f5e0c77cb4b94b3c379d941558e9fbe1c1874edd2ad2960c13d3b76c19701

    • SHA512

      18456c7b1e62a4e084e838d06c38e803b64fd3a2a129a8ba9d32347c85bac9e8d216305b16dd3f9852871e7a493e1e4493e4549b66b3d6ed5f3e4cd2ef763132

    • SSDEEP

      768:AzvTe3RRR3Id/fkENE0M8cxyc7AWqpK5lww9:ETefBYnxEt8Oyc7Aj4r9

    Score
    3/10
    • Target

      stl_03.ott

    • Size

      46KB

    • MD5

      5b4cfd625644de7e114e15c2311cb738

    • SHA1

      bd64acdc0939b351c06489f96b0ed8f8e417e991

    • SHA256

      e6b723bb3217c7b7246c50fc5e4aee2d2366d84f5f32c007675e5cfbac6c2646

    • SHA512

      560b04cc034cab1d8b2928db4019f3013fc50dd4329e66568406e80bce1106bfdeb638d57c4ff23052d69bf41c8d92f405d7616a80b06f99d989e54b1da707cb

    • SSDEEP

      768:i94yWuIOu5S/UIfgi/PRJ/8fgm6HK/+DajL1rg/u0Qdv1tp2NiJtAG2We3Tc0:isu65S/UgPj/Ogm6HK/LjLBg20uvPs4w

    Score
    3/10
    • Target

      swui.dll

    • Size

      1.5MB

    • MD5

      d3d5ae822084770b3cc1ad2e2222c600

    • SHA1

      f58d74dc466b1f8367a65e56f35a8ec2b712291c

    • SHA256

      e525be178ba3ef4f35486b6656913c6857b2b98e89c369a8c069733b30f4662e

    • SHA512

      c8dcecb78ccf406cc98c2f3d92aa8dab3c51a597dcfdc241b77c80194f8df07d800f7f810945c4d4c4f42f63d93462e523a97270ba91c1f4cc2dbf9dd908930c

    • SSDEEP

      24576:poEDbPFctM/m22Jh0bM2dcAE8pnbQPTc/U1oQwLoIVaDPSNubwp4StVxlHh:jbPFctH2dbDlECnbhU1oQwEDPSNuMp4k

    Score
    3/10
    • Target

      symbol.py

    • Size

      2KB

    • MD5

      0058a0a418718108870925c35a88ba7e

    • SHA1

      ae1a91365883b30fd4096a7926a3895e15d8fd96

    • SHA256

      048a3382441bc0ac28cc445d3f812188cd31ce4fe3b39c992552a7783beb1444

    • SHA512

      e147c5d34151ef4065a622506a8c74c71aecc677563b1670b71e789d98d1db5bc81d5f3631addf2fd2e0c11790cf60cbbe00f42868f70b6f53e22373ffeb2bbe

    Score
    3/10
    • Target

      symbols.py

    • Size

      14KB

    • MD5

      e545949faeb765841c5e9a80fb481579

    • SHA1

      cb9616388955f71e778829f14bb5e70918fb22ec

    • SHA256

      f6ae8a236973ade89b59356d553671e7de187af9174b5d9ab40ab587e852840b

    • SHA512

      76e297eeb98d85e5ace23145f9580e696e04dceb7652009bd14c3a023cfa2040596d420fbb18d0a9ab6a7a2ff54d7a484dde3b2f83450023b814415351564652

    • SSDEEP

      384:+roY7d1LQBaCLeCVryaMLEn2+R8V9z5lgodI7qw:+3YJrTMLK2+R8V9z5aodI7L

    Score
    3/10
    • Target

      symtable.py

    • Size

      7KB

    • MD5

      718459a7f9f8465ee7f1316191d660da

    • SHA1

      cacc91c61ba4ecf8483e9125d6731adc653f1507

    • SHA256

      104d77530a9cdbc7eea9526e5b0439ffa795f3228843c25255ca7c09cc585195

    • SHA512

      bfaf95104f001f747b2003021cc23383d0e1f75c5c43e622803fb5357af00900ad1ff654b85e7f3f04d605b1aab68f85af46634689a8301233f580eca99e1558

    • SSDEEP

      96:ef+mQb/oR0RW5tCNkXFVhnAnvqmL/ZBd3dJaQL8xVZ2seh1oFvrUZJFgQclfdQT+:WZRkmXLyJaQL8zEsehKDUPFgQEQT89

    Score
    3/10
    • Target

      synchronize.py

    • Size

      10KB

    • MD5

      2edbd43424105c8f9f3d60bb32f779f4

    • SHA1

      2563bcd46642fec9ccdd7b751c3175735d7a3ea5

    • SHA256

      cf7f352e560b9d5e3961f3b3675099067c19c6e366156bf1dc5a93b51583b01e

    • SHA512

      da9f32c47d4bd418f07994a605f516df5d21694bf75d6a115342c538ed3f735058028eb2010c481638067c6c8ca9e1acb32a0ecc7661c12c5e15c1f369a0b7ef

    • SSDEEP

      192:TDrskrsDxH3u3XFyQ84v8+O7xvQNvHjg5W5e4exeJSKqN43AesNC1gsds1tNzsNL:PrskrsDxXA1l84DuQR4qT

    Score
    3/10
    • Target

      syntax.py

    • Size

      1KB

    • MD5

      2471732bd90a075c734b861d27e415e3

    • SHA1

      cffb381faff5e0c445681416473f5b775a5ea20b

    • SHA256

      d6462cce87bd39a421ea0fc3c318bb35a4188d4913ba99a433b40e146aa861e2

    • SHA512

      702c552277918a8de3ca01fc45ef1093cb9ffd761257a15746c081a0a25a8e1e2c218bcc4399939e19003e07d9522225a3be9b4975593d9deb3173a164e99d85

    Score
    3/10
    • Target

      sysconfig.py

    • Size

      17KB

    • MD5

      aec0ffc5cd6dcf2ad661ad9436ce5a46

    • SHA1

      a5e219b754717cd5271335d513a6bb9aa83ec8e2

    • SHA256

      7e597c01e2e335182d00f80f243265a32b09f0984361d4fbe366a172c9193a31

    • SHA512

      e6f7e0f06565c50f9e8634b1727035c561a28c23bb9903faa6655e86d425d39cdf7a9d9120dbdd66ec946a26c599099d9a60446d7e8a043fe3a69156729fc12c

    • SSDEEP

      384:zMfYyVI3A+uDF/uRoUpr22KW81iSdW+KL:byTDiR381iSdOL

    Score
    3/10
    • Target

      sysconfig1.py

    • Size

      22KB

    • MD5

      3b84c280bd292b6cf9687e674f17d8d6

    • SHA1

      33d0bfe80b95fb1dda1126c6a6904cadb9f5ffaa

    • SHA256

      d42ed5f5152292260675fdcd479e4d2e885ba82cab4f5cb9c5b8278d4bf83167

    • SHA512

      36c33a08d28d0897e6d8495b13d833fb6fa65b54d08964221967a353b776985b84cdbc5c2e21b3de0347787f46fa3569d2f86ccbf5ecaefa0876115ca7c39762

    • SSDEEP

      384:zmABqz2Nr1ivPHwi+O7fWaE5fuQLZY+UMlPSboG9Y5ys6dgsHHI361F:61PHwi+4+acfucZY+UAOoSs6dgsHo36f

    Score
    3/10
    • Target

      sysdtrans.dll

    • Size

      115KB

    • MD5

      6eb868b4341f19f95e8f40fbae2d5b49

    • SHA1

      ac0e4a7c9e01093e870d381103848aac1fb53c9f

    • SHA256

      edbf894e9965da6250bdc12c46af261efc2be4afd817ac755850efcaf9492921

    • SHA512

      1ea323f658ec812e135f468ce6a5b63774907b52e71ffcb9070e88364530993759829cf6959ebca6ad91b061006f4bba765e62f2552b6a4f4a1d23c8cf0092b1

    • SSDEEP

      1536:6evoVIb+Gs2Q2mksrsDXbsGcCcdqFAQBvJINBcCGLXO+Y+MwqY:6evoVI9soJMdqqQBBwSLXOJ+MwqY

    Score
    3/10
    • Target

      sysmail.uno.dll

    • Size

      40KB

    • MD5

      7a0d0717ae39c841c3ecf9cbb3505fbe

    • SHA1

      be40260761b4b1caada63a9b74e0bf1a8201129b

    • SHA256

      cb724827a2b848541ffebc52394c19ecd4ad7522189eda146a0b5f14664e4043

    • SHA512

      fac529237b1868e6f5a6d3ebb13c4ba1c5a33fd27bf7ba87c3d335679b78ad601aba415eb9427217c66bd7cb2a002461a17b3074345f89195a1f169fa23d2187

    • SSDEEP

      768:OtE+xp5GuElnrmm4Cqzp9N2hQYVBT2OKSosmq:ODLLw6m4Cqz7u9t2OKfsmq

    Score
    3/10
    • Target

      syssh.uno.dll

    • Size

      24KB

    • MD5

      749c5a95f9fb9a96e7f6b7d3bce8c986

    • SHA1

      b6875c9d859f3dd324e3d1d0958ef2d304a932e2

    • SHA256

      e1c0ca1cb0223aed6572e54c51dbc561ee957833d4faa61cc56d19316fd04e8b

    • SHA512

      e40678b12e467a4b2794355ab837030e314aa434bd883e0f35f3085f86db7fb21bd90b9751ad91134e13e81e1cc3944b288ac549f7f02c06fb84ce3ea9f4575f

    • SSDEEP

      384:u9EeXirxVjDblFrO+JCMcE4Nw2cvwfo62OKbggV5ap/orCRL:OE5TjD+My72OKjUor+

    Score
    3/10
    • Target

      t602filter.dll

    • Size

      69KB

    • MD5

      46c2dac0513d8065c14221e0cbc96e63

    • SHA1

      edf09bd61ab1d18fb02ba31f5d9199169083ea35

    • SHA256

      26be71e7a1773386e02756dd945f4f1662de1ca9f0442e181f6f73a7ac7428c5

    • SHA512

      fa6ebd52ae3491fac2e8802b89e0762a21e3811687bf7347a301552e12e5013be42208989e66797590e21dc8c0531cb550375abf5a3f48aeaf3352c01234604d

    • SSDEEP

      1536:5SPazadTB9wSFr3Cbtn83ED0tS56xaI5kLzWRJziJLwLSHAOiWK+lzzMu2OK4Pp3:KdTB9VFOZ1wLS3zzWOKW/v

    Score
    3/10
    • Target

      tabbedpages.py

    • Size

      18KB

    • MD5

      b1df486a11ebde60247d4b5cecd27897

    • SHA1

      8ed14206e231e8f9beb7309c5a93da4db8a3227a

    • SHA256

      13ab20e0c42f5c0f2ff10334436b310208080949a20283dbd1f92e124cbeb253

    • SHA512

      c887e36968d205214feaa93d5e8abeab2ed5f306e82ef49b31f822ae4d1405a9a47d95e0d7b66ba65341e8478e929fff7f3cd97b2a46653de9b2bb1dac6bfe3a

    • SSDEEP

      192:ekjQmigq20eI1CTCD8B1FAqop5/6oMm0RDL4Y9eYDY+KkPm:ekUmOMWCTCG2IoMBn410B5O

    Score
    3/10
    • Target

      table.jar

    • Size

      30KB

    • MD5

      48b580a4829be6e7900834af2b61d2c4

    • SHA1

      059d8a4556b592cafee7c9c0dd494af775643fbd

    • SHA256

      5713b5bdd6d35eaa1b5700acd8312411592455936a77979c83bad0c60edbc664

    • SHA512

      7741edc1d988a35fab773b515cb9c3c593cd2394b837c3b0d0a48d0c49df426374e8372962502628f7a6f99a1d4ee42b1ad90ba611c753d3a735f2dbffd1d01d

    • SSDEEP

      768:QJC7Zne9MdadwI+Ce16aoUc71ba0U5mrYgKDV:4WdSMduDs6TU6LcDV

    Score
    1/10
    • Target

      tabnanny.py

    • Size

      11KB

    • MD5

      1d2d43f06f2260a4d339eb17a4763725

    • SHA1

      1bd89ee93df3a88a99e4d5d9b14178a59fc38ab4

    • SHA256

      8eb11e7261ac0bb30dd98a82e973ff29503e32fe1a0682499835aaa3e3a4d653

    • SHA512

      07e75598c5411a2159bd621ebf48518538c1dc9701e2b76c5135cd170e841ff291d52a43fd0568b90d381aa409b7d820413ca7dcbc5f00d505dfe6efb0b40a4d

    • SSDEEP

      192:GKRZQZpL3/wvmBDw6Vhc2EdYyNc2hHvsX4F4OGDhbId2nUPrXPLPOGtC6P6/fM:ZMpLvOmdw+DEdYyNnhHvsX4F4OGDhsgo

    Score
    3/10
    • Target

      tarfile.py

    • Size

      88KB

    • MD5

      284d82373a14223ff058777119582eb8

    • SHA1

      86f582401058cb52e60daaeff2a66b55358f46aa

    • SHA256

      12b6aff41b3f7e73139b4fb32941e435d06ed9e9d42f4fd9c2a9cda177415fe3

    • SHA512

      74a5397b8e7f7080d5a75566165e0d43b0abf0a7f2acff2aa8bc65b446b7fe182e6f858f753e6523258c136681326c25227124db97db0f9d01f3ed6be12b8b8c

    • SSDEEP

      768:eRErKU9V1BLAc9mmdoL6WzsK5OPRMcZi0jdrCZo963NfNID7xC:iEjpfdoL6WzsK0PdjdOZo963NfNt

    Score
    3/10
    • Target

      telnetlib.py

    • Size

      26KB

    • MD5

      a8758557226bcb3d71c5fee9fa513020

    • SHA1

      50a72c21c521c2b95aea002ec94cf94499d7c4cb

    • SHA256

      7852298241ce34d1b08ec1d079b0280c331cc4ab5b41a4c17bfecd055a372c7d

    • SHA512

      cbead1cd8cec31afd519ea9695997695715aa627ee3cfc47d6a35cc24c4092efb507a9cf289c3ece62210f7ea7d7b71a4de224e6c467081bc42635ed932d7b36

    • SSDEEP

      384:Vp6pRh1i1Lo430tyvL74zTOpyHCVZellNBbt6aUQ4wEQN:Vsh1ipo+0tyvL7sOpyHCVAllN7

    Score
    3/10
    • Target

      tempfile.py

    • Size

      19KB

    • MD5

      147421b83f28bcbe5da60a8e1952a585

    • SHA1

      98a78cb579e343d9f8f86edf8775ac78807a2ea4

    • SHA256

      998a652c7f807b0dcc8e24949c88848c48e6819193138bf0135cc7d5fa8d9150

    • SHA512

      35feb1c5c84029ce31cbb0cf54ccfdd115b038155912c74b97df69f1fc38f89305abf3966c5d5583b46316830e93fa1adf604ef64c31fd2e37cccabb495d5358

    • SSDEEP

      384:eGech4xEGP/RkH6/dr8c4Mq7GKg3Z7oHK6i:NecPGHRe6/drl4Mq7tg3Z7oxi

    Score
    3/10
    • Target

      textoutstream.uno.dll

    • Size

      22KB

    • MD5

      c27254aed7ac9cfbc61e6dbd51904968

    • SHA1

      6022370f585a9d9ea0618140b100e1eac9e33cce

    • SHA256

      2fbe6c29e6de2906e72ec84bbe03f42a055111ba6768512045b2d4745d63d547

    • SHA512

      fa3503a3e550f81105fe72ed666c0f3f9b071b0494edaa0a70c24c1c049acd80bb2360b49dd6355d0743521c5256dc2bf3b07823b3f4c500ab676424fd4567b7

    • SSDEEP

      384:D9ewMvchS2fZ6a2JdPzf2KrqbJk+E1SeWXOOVlvtnKyiL6:AwB0Pzf3qlkqXOIHKyP

    Score
    3/10
    • Target

      openoffice4115.msi

    • Size

      2.4MB

    • MD5

      63d6263904b3783c61f70232bc6b0749

    • SHA1

      140cc43faf463b74a60805aa80711a75b352ae18

    • SHA256

      a63fc1a0b7664e6c62d5f4d277c8bb46c3ddbf2c941c92ebe97a452e0a493590

    • SHA512

      3c6ed5d9a830801fff7fc0013de4e4f60b9fc00c3c43351a1739228e5278bd95d226b022e0341ec7cd0fe6faa7934ac517f11a116cf3d00b9f35bae1c7dab31d

    • SSDEEP

      24576:vLwe12pZVGZwyYvyQG0VgiUJ3SB9mmYSsu84B9kwIuSx:vLwegpTGfktUtI1B3

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      readmes/readme_es.html

    • Size

      12KB

    • MD5

      0d173c8f143e510b74a3eef69ce03a72

    • SHA1

      b3fad3a4e1ef12023fc027b7c501abc37426eb51

    • SHA256

      04fe1370099e739115463c1bd61413659846bf650fd5bed4fa8ec5929bb38716

    • SHA512

      546f55f91b4c9d0fa07c168e5f5ad34cce413340d3161aeac68a84348d375ae59dfb7105e0eef29955fc326b1a1c854f674b19ea8a2e97ee576a71e249f5077c

    • SSDEEP

      192:Ln0yPTAkd2JmSC/nVphn+LzSfQqm3DkBto/f2I+vqjHsQsUG6rIG3D:oy12JmV/nV+LuIk7el+Q3XrxD

    Score
    4/10
    • Target

      redist/vcredist_x64.exe

    • Size

      5.0MB

    • MD5

      e2ada570911edaaae7d1b3c979345fce

    • SHA1

      a7c83077b8a28d409e36316d2d7321fa0ccdb7e8

    • SHA256

      b811f2c047a3e828517c234bd4aa4883e1ec591d88fad21289ae68a6915a6665

    • SHA512

      b890d83d36f3681a690828d8926139b4f13f8d2fcd258581542cf2fb7dce5d7e7e477731c9545a54a476ed5c2aaac44ce12d2c3d9b99c2c1c04a5ab4ee20c4b8

    • SSDEEP

      98304:98I8/pCVmdbx2rU/xFnTBU8UeNeagEXtIgvjyGFDdo85qyKYr5NM62dNKViClWPg:9Avx2rw5Th8XeNyGtW0DJr5uDdQdWPet

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Target

      redist/vcredist_x86.exe

    • Size

      4.3MB

    • MD5

      35da2bf2befd998980a495b6f4f55e60

    • SHA1

      470640aa4bb7db8e69196b5edb0010933569e98d

    • SHA256

      6b3e4c51c6c0e5f68c8a72b497445af3dbf976394cbb62aa23569065c28deeb6

    • SHA512

      bf630667c87b8f10ef85b61f2f379d7ce24124618b999babfec8e2df424eb494b8f1bf0977580810dff5124d4dbdec9539ff53e0dc14625c076fa34dfe44e3f2

    • SSDEEP

      98304:vT4tlQ0aeY51XNURYxaA6qjEb9tRuPmBmWBDLTMTtbslyzRt9cuISY6Qa:vKlhE9U6476itR+mLPw6lyZY61

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Target

      setup.exe

    • Size

      468KB

    • MD5

      5b8919735858ed14281644d2c240100e

    • SHA1

      7f6375515e18679cf457f2bad67892db5a217555

    • SHA256

      b78712b6fbe78bbdb57b25f985262e38e061811e244aa39297fd5a0c91d80ffa

    • SHA512

      34d8faa0a71f02afff0699be326962938c36c55ba175a35f6a214bc1038f0bd1731f9a2566651a4dc932fc7814aa11bfec4533e5fe499dba3dfef910547c8ad4

    • SSDEEP

      6144:w1p3HAzqXU1jsNVRbIf7m6A5f4LT9XTj8Tu6eezwJ:w1p3H6mUlKVRcf7lUsXcTus

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

static1

bruteratel
Score
10/10

behavioral1

discoverypersistenceprivilege_escalation
Score
6/10

behavioral2

discovery
Score
3/10

behavioral3

Score
3/10

behavioral4

Score
3/10

behavioral5

Score
3/10

behavioral6

Score
3/10

behavioral7

Score
3/10

behavioral8

Score
3/10

behavioral9

discovery
Score
3/10

behavioral10

Score
3/10

behavioral11

Score
3/10

behavioral12

Score
3/10

behavioral13

Score
3/10

behavioral14

Score
3/10

behavioral15

Score
3/10

behavioral16

Score
3/10

behavioral17

discovery
Score
3/10

behavioral18

discovery
Score
3/10

behavioral19

discovery
Score
3/10

behavioral20

discovery
Score
3/10

behavioral21

Score
3/10

behavioral22

Score
1/10

behavioral23

Score
3/10

behavioral24

Score
3/10

behavioral25

Score
3/10

behavioral26

Score
3/10

behavioral27

discovery
Score
3/10

behavioral28

discoverypersistenceprivilege_escalation
Score
6/10

behavioral29

discovery
Score
4/10

behavioral30

discovery
Score
7/10

behavioral31

discovery
Score
7/10

behavioral32

discovery
Score
7/10