Overview
overview
10Static
static
10Apache_Ope...es.exe
windows10-ltsc 2021-x64
6$PLUGINSDI...ns.dll
windows10-ltsc 2021-x64
3stat.py
windows10-ltsc 2021-x64
3stats.py
windows10-ltsc 2021-x64
3statvfs.py
windows10-ltsc 2021-x64
3stl_01.ott
windows10-ltsc 2021-x64
3stl_02.ott
windows10-ltsc 2021-x64
3stl_03.ott
windows10-ltsc 2021-x64
3swui.dll
windows10-ltsc 2021-x64
3symbol.py
windows10-ltsc 2021-x64
3symbols.py
windows10-ltsc 2021-x64
3symtable.py
windows10-ltsc 2021-x64
3synchronize.py
windows10-ltsc 2021-x64
3syntax.py
windows10-ltsc 2021-x64
3sysconfig.py
windows10-ltsc 2021-x64
3sysconfig1.py
windows10-ltsc 2021-x64
3sysdtrans.dll
windows10-ltsc 2021-x64
3sysmail.uno.dll
windows10-ltsc 2021-x64
3syssh.uno.dll
windows10-ltsc 2021-x64
3t602filter.dll
windows10-ltsc 2021-x64
3tabbedpages.py
windows10-ltsc 2021-x64
3table.jar
windows10-ltsc 2021-x64
1tabnanny.py
windows10-ltsc 2021-x64
3tarfile.py
windows10-ltsc 2021-x64
3telnetlib.py
windows10-ltsc 2021-x64
3tempfile.py
windows10-ltsc 2021-x64
3textoutstream.uno.dll
windows10-ltsc 2021-x64
3openoffice4115.msi
windows10-ltsc 2021-x64
6readmes/re...s.html
windows10-ltsc 2021-x64
4redist/vcr...64.exe
windows10-ltsc 2021-x64
7redist/vcr...86.exe
windows10-ltsc 2021-x64
7setup.exe
windows10-ltsc 2021-x64
7General
-
Target
Apache_OpenOffice_4.1.15_Win_x86_install_es.exe
-
Size
125.6MB
-
Sample
250122-sptxcatlgn
-
MD5
bbe59728aaa6b2647abce7d07c14417d
-
SHA1
0cd604617b54550b236acba507202ef1531e78bc
-
SHA256
bbdf4c8d657e3123bd009ab086758bfd707f9b8c7f5fabb22783c4cb81784ca8
-
SHA512
eb3db0f8543c58c7882b20f995aa28981297af5ac00a3fe00ac7f704897efd16125edf3739dfc28c4151477ccb0fc23bc1ff4ac69de41ce58c25d0f0df2f4c11
-
SSDEEP
3145728:5GHXeD6lphGi7zgp0Jub3DUAAGaSNl3+MeWXi3Fmqa:c3zlpbzW0JubwI7+lii3sB
Behavioral task
behavioral1
Sample
Apache_OpenOffice_4.1.15_Win_x86_install_es.exe
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral3
Sample
stat.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral4
Sample
stats.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral5
Sample
statvfs.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral6
Sample
stl_01.ott
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral7
Sample
stl_02.ott
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral8
Sample
stl_03.ott
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral9
Sample
swui.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral10
Sample
symbol.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral11
Sample
symbols.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral12
Sample
symtable.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral13
Sample
synchronize.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral14
Sample
syntax.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral15
Sample
sysconfig.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral16
Sample
sysconfig1.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral17
Sample
sysdtrans.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral18
Sample
sysmail.uno.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral19
Sample
syssh.uno.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral20
Sample
t602filter.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral21
Sample
tabbedpages.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral22
Sample
table.jar
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral23
Sample
tabnanny.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral24
Sample
tarfile.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral25
Sample
telnetlib.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral26
Sample
tempfile.py
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral27
Sample
textoutstream.uno.dll
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral28
Sample
openoffice4115.msi
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral29
Sample
readmes/readme_es.html
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral30
Sample
redist/vcredist_x64.exe
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral31
Sample
redist/vcredist_x86.exe
Resource
win10ltsc2021-20250113-es
Behavioral task
behavioral32
Sample
setup.exe
Resource
win10ltsc2021-20250113-es
Malware Config
Targets
-
-
Target
Apache_OpenOffice_4.1.15_Win_x86_install_es.exe
-
Size
125.6MB
-
MD5
bbe59728aaa6b2647abce7d07c14417d
-
SHA1
0cd604617b54550b236acba507202ef1531e78bc
-
SHA256
bbdf4c8d657e3123bd009ab086758bfd707f9b8c7f5fabb22783c4cb81784ca8
-
SHA512
eb3db0f8543c58c7882b20f995aa28981297af5ac00a3fe00ac7f704897efd16125edf3739dfc28c4151477ccb0fc23bc1ff4ac69de41ce58c25d0f0df2f4c11
-
SSDEEP
3145728:5GHXeD6lphGi7zgp0Jub3DUAAGaSNl3+MeWXi3Fmqa:c3zlpbzW0JubwI7+lii3sB
Score6/10-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
15KB
-
MD5
d095b082b7c5ba4665d40d9c5042af6d
-
SHA1
2220277304af105ca6c56219f56f04e894b28d27
-
SHA256
b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
-
SHA512
61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
SSDEEP
192:EyGQtZkTktEQUrJaZfuyCnSmUsv3sY7L7cW8Y6Q86QvoTr11929WtshLAzgSrX8:EyNt+4t7uJalUnGesY7Lt8nCr/Yosa
Score3/10 -
-
-
Target
stat.py
-
Size
1KB
-
MD5
0f443c15753459fc012f1c68fdd810dc
-
SHA1
0f52e7aa4804852dc2bb4944949695b8047807ab
-
SHA256
0b6cc8ca3b5e038eb02eb0e8299b01c9b27b51b45a5df621a426544b3d046d5f
-
SHA512
6fef490e8a9ffe654cdfd98569c213ad4cee8c97709fda48d307f1ced205041b1415f0e55022481acb8161fb2c2049222eba1527201dbc3f258b1e4e4bdef43e
Score3/10 -
-
-
Target
stats.py
-
Size
2KB
-
MD5
88cce69b140c972f39bca2fc0a56a24b
-
SHA1
d1dab86b6d06f884282fc660c02d6d3b366b04f9
-
SHA256
7143248621b97d934a8b32e898fe1146d525b0ff609ee2b2e78610b7692efa64
-
SHA512
555abfd97bd65e0d8b9a6bffebd6978b291e28ca60abe00b15a5f2838a81d9042c34bb1d3f32e3b69f996028962a1ddcc0cc95a1465f9053cdf5a0d09ab514ed
Score3/10 -
-
-
Target
statvfs.py
-
Size
898B
-
MD5
4a3b595742f7c441d8fbbd1cded2fa1d
-
SHA1
9355dc67a61507bbf5e7a66dc05b6b1adb0f8506
-
SHA256
4ccf280dab73868ce5bbe1f7e146ef8acf2c189a77eb054ec5b7fbcee73dbd9d
-
SHA512
a6fc90ffbaa5665a9858aca59ace19cf66991817130085fa9116e5907e948b6897aaa0d46c7790046e71f17226e23d81d50032dd151930b2b3d557f188bc5a93
Score3/10 -
-
-
Target
stl_01.ott
-
Size
37KB
-
MD5
81ac2d7b648026ae4b5e95be2d77d406
-
SHA1
3bcdf3032251990f65c98ab0f0c1ca790597660d
-
SHA256
df36adf98577de3c41852c764fe079532f4f0bbeb0a1ab402b421f4906c5c296
-
SHA512
f9aacf9e6d584843d5302039799b0a7428c4672fb1d1e0c324ef8e7aa5111c4e8bd2fe3ff727513465b9399bdfcba50ead0dd295c442dd45e07a5d5bfe241898
-
SSDEEP
768:B1hTSkAsTUWid5KauiNpDnE9N10zNbX3pGlHdoN40UiZ:B1hT5IWid5pVs10z1ySUy
Score3/10 -
-
-
Target
stl_02.ott
-
Size
24KB
-
MD5
0e7e64af741107a5ba687fae2f6c1c42
-
SHA1
d4036f4a3e04c0ea7755ea9eb066e1bf5c23c10c
-
SHA256
874f5e0c77cb4b94b3c379d941558e9fbe1c1874edd2ad2960c13d3b76c19701
-
SHA512
18456c7b1e62a4e084e838d06c38e803b64fd3a2a129a8ba9d32347c85bac9e8d216305b16dd3f9852871e7a493e1e4493e4549b66b3d6ed5f3e4cd2ef763132
-
SSDEEP
768:AzvTe3RRR3Id/fkENE0M8cxyc7AWqpK5lww9:ETefBYnxEt8Oyc7Aj4r9
Score3/10 -
-
-
Target
stl_03.ott
-
Size
46KB
-
MD5
5b4cfd625644de7e114e15c2311cb738
-
SHA1
bd64acdc0939b351c06489f96b0ed8f8e417e991
-
SHA256
e6b723bb3217c7b7246c50fc5e4aee2d2366d84f5f32c007675e5cfbac6c2646
-
SHA512
560b04cc034cab1d8b2928db4019f3013fc50dd4329e66568406e80bce1106bfdeb638d57c4ff23052d69bf41c8d92f405d7616a80b06f99d989e54b1da707cb
-
SSDEEP
768:i94yWuIOu5S/UIfgi/PRJ/8fgm6HK/+DajL1rg/u0Qdv1tp2NiJtAG2We3Tc0:isu65S/UgPj/Ogm6HK/LjLBg20uvPs4w
Score3/10 -
-
-
Target
swui.dll
-
Size
1.5MB
-
MD5
d3d5ae822084770b3cc1ad2e2222c600
-
SHA1
f58d74dc466b1f8367a65e56f35a8ec2b712291c
-
SHA256
e525be178ba3ef4f35486b6656913c6857b2b98e89c369a8c069733b30f4662e
-
SHA512
c8dcecb78ccf406cc98c2f3d92aa8dab3c51a597dcfdc241b77c80194f8df07d800f7f810945c4d4c4f42f63d93462e523a97270ba91c1f4cc2dbf9dd908930c
-
SSDEEP
24576:poEDbPFctM/m22Jh0bM2dcAE8pnbQPTc/U1oQwLoIVaDPSNubwp4StVxlHh:jbPFctH2dbDlECnbhU1oQwEDPSNuMp4k
Score3/10 -
-
-
Target
symbol.py
-
Size
2KB
-
MD5
0058a0a418718108870925c35a88ba7e
-
SHA1
ae1a91365883b30fd4096a7926a3895e15d8fd96
-
SHA256
048a3382441bc0ac28cc445d3f812188cd31ce4fe3b39c992552a7783beb1444
-
SHA512
e147c5d34151ef4065a622506a8c74c71aecc677563b1670b71e789d98d1db5bc81d5f3631addf2fd2e0c11790cf60cbbe00f42868f70b6f53e22373ffeb2bbe
Score3/10 -
-
-
Target
symbols.py
-
Size
14KB
-
MD5
e545949faeb765841c5e9a80fb481579
-
SHA1
cb9616388955f71e778829f14bb5e70918fb22ec
-
SHA256
f6ae8a236973ade89b59356d553671e7de187af9174b5d9ab40ab587e852840b
-
SHA512
76e297eeb98d85e5ace23145f9580e696e04dceb7652009bd14c3a023cfa2040596d420fbb18d0a9ab6a7a2ff54d7a484dde3b2f83450023b814415351564652
-
SSDEEP
384:+roY7d1LQBaCLeCVryaMLEn2+R8V9z5lgodI7qw:+3YJrTMLK2+R8V9z5aodI7L
Score3/10 -
-
-
Target
symtable.py
-
Size
7KB
-
MD5
718459a7f9f8465ee7f1316191d660da
-
SHA1
cacc91c61ba4ecf8483e9125d6731adc653f1507
-
SHA256
104d77530a9cdbc7eea9526e5b0439ffa795f3228843c25255ca7c09cc585195
-
SHA512
bfaf95104f001f747b2003021cc23383d0e1f75c5c43e622803fb5357af00900ad1ff654b85e7f3f04d605b1aab68f85af46634689a8301233f580eca99e1558
-
SSDEEP
96:ef+mQb/oR0RW5tCNkXFVhnAnvqmL/ZBd3dJaQL8xVZ2seh1oFvrUZJFgQclfdQT+:WZRkmXLyJaQL8zEsehKDUPFgQEQT89
Score3/10 -
-
-
Target
synchronize.py
-
Size
10KB
-
MD5
2edbd43424105c8f9f3d60bb32f779f4
-
SHA1
2563bcd46642fec9ccdd7b751c3175735d7a3ea5
-
SHA256
cf7f352e560b9d5e3961f3b3675099067c19c6e366156bf1dc5a93b51583b01e
-
SHA512
da9f32c47d4bd418f07994a605f516df5d21694bf75d6a115342c538ed3f735058028eb2010c481638067c6c8ca9e1acb32a0ecc7661c12c5e15c1f369a0b7ef
-
SSDEEP
192:TDrskrsDxH3u3XFyQ84v8+O7xvQNvHjg5W5e4exeJSKqN43AesNC1gsds1tNzsNL:PrskrsDxXA1l84DuQR4qT
Score3/10 -
-
-
Target
syntax.py
-
Size
1KB
-
MD5
2471732bd90a075c734b861d27e415e3
-
SHA1
cffb381faff5e0c445681416473f5b775a5ea20b
-
SHA256
d6462cce87bd39a421ea0fc3c318bb35a4188d4913ba99a433b40e146aa861e2
-
SHA512
702c552277918a8de3ca01fc45ef1093cb9ffd761257a15746c081a0a25a8e1e2c218bcc4399939e19003e07d9522225a3be9b4975593d9deb3173a164e99d85
Score3/10 -
-
-
Target
sysconfig.py
-
Size
17KB
-
MD5
aec0ffc5cd6dcf2ad661ad9436ce5a46
-
SHA1
a5e219b754717cd5271335d513a6bb9aa83ec8e2
-
SHA256
7e597c01e2e335182d00f80f243265a32b09f0984361d4fbe366a172c9193a31
-
SHA512
e6f7e0f06565c50f9e8634b1727035c561a28c23bb9903faa6655e86d425d39cdf7a9d9120dbdd66ec946a26c599099d9a60446d7e8a043fe3a69156729fc12c
-
SSDEEP
384:zMfYyVI3A+uDF/uRoUpr22KW81iSdW+KL:byTDiR381iSdOL
Score3/10 -
-
-
Target
sysconfig1.py
-
Size
22KB
-
MD5
3b84c280bd292b6cf9687e674f17d8d6
-
SHA1
33d0bfe80b95fb1dda1126c6a6904cadb9f5ffaa
-
SHA256
d42ed5f5152292260675fdcd479e4d2e885ba82cab4f5cb9c5b8278d4bf83167
-
SHA512
36c33a08d28d0897e6d8495b13d833fb6fa65b54d08964221967a353b776985b84cdbc5c2e21b3de0347787f46fa3569d2f86ccbf5ecaefa0876115ca7c39762
-
SSDEEP
384:zmABqz2Nr1ivPHwi+O7fWaE5fuQLZY+UMlPSboG9Y5ys6dgsHHI361F:61PHwi+4+acfucZY+UAOoSs6dgsHo36f
Score3/10 -
-
-
Target
sysdtrans.dll
-
Size
115KB
-
MD5
6eb868b4341f19f95e8f40fbae2d5b49
-
SHA1
ac0e4a7c9e01093e870d381103848aac1fb53c9f
-
SHA256
edbf894e9965da6250bdc12c46af261efc2be4afd817ac755850efcaf9492921
-
SHA512
1ea323f658ec812e135f468ce6a5b63774907b52e71ffcb9070e88364530993759829cf6959ebca6ad91b061006f4bba765e62f2552b6a4f4a1d23c8cf0092b1
-
SSDEEP
1536:6evoVIb+Gs2Q2mksrsDXbsGcCcdqFAQBvJINBcCGLXO+Y+MwqY:6evoVI9soJMdqqQBBwSLXOJ+MwqY
Score3/10 -
-
-
Target
sysmail.uno.dll
-
Size
40KB
-
MD5
7a0d0717ae39c841c3ecf9cbb3505fbe
-
SHA1
be40260761b4b1caada63a9b74e0bf1a8201129b
-
SHA256
cb724827a2b848541ffebc52394c19ecd4ad7522189eda146a0b5f14664e4043
-
SHA512
fac529237b1868e6f5a6d3ebb13c4ba1c5a33fd27bf7ba87c3d335679b78ad601aba415eb9427217c66bd7cb2a002461a17b3074345f89195a1f169fa23d2187
-
SSDEEP
768:OtE+xp5GuElnrmm4Cqzp9N2hQYVBT2OKSosmq:ODLLw6m4Cqz7u9t2OKfsmq
Score3/10 -
-
-
Target
syssh.uno.dll
-
Size
24KB
-
MD5
749c5a95f9fb9a96e7f6b7d3bce8c986
-
SHA1
b6875c9d859f3dd324e3d1d0958ef2d304a932e2
-
SHA256
e1c0ca1cb0223aed6572e54c51dbc561ee957833d4faa61cc56d19316fd04e8b
-
SHA512
e40678b12e467a4b2794355ab837030e314aa434bd883e0f35f3085f86db7fb21bd90b9751ad91134e13e81e1cc3944b288ac549f7f02c06fb84ce3ea9f4575f
-
SSDEEP
384:u9EeXirxVjDblFrO+JCMcE4Nw2cvwfo62OKbggV5ap/orCRL:OE5TjD+My72OKjUor+
Score3/10 -
-
-
Target
t602filter.dll
-
Size
69KB
-
MD5
46c2dac0513d8065c14221e0cbc96e63
-
SHA1
edf09bd61ab1d18fb02ba31f5d9199169083ea35
-
SHA256
26be71e7a1773386e02756dd945f4f1662de1ca9f0442e181f6f73a7ac7428c5
-
SHA512
fa6ebd52ae3491fac2e8802b89e0762a21e3811687bf7347a301552e12e5013be42208989e66797590e21dc8c0531cb550375abf5a3f48aeaf3352c01234604d
-
SSDEEP
1536:5SPazadTB9wSFr3Cbtn83ED0tS56xaI5kLzWRJziJLwLSHAOiWK+lzzMu2OK4Pp3:KdTB9VFOZ1wLS3zzWOKW/v
Score3/10 -
-
-
Target
tabbedpages.py
-
Size
18KB
-
MD5
b1df486a11ebde60247d4b5cecd27897
-
SHA1
8ed14206e231e8f9beb7309c5a93da4db8a3227a
-
SHA256
13ab20e0c42f5c0f2ff10334436b310208080949a20283dbd1f92e124cbeb253
-
SHA512
c887e36968d205214feaa93d5e8abeab2ed5f306e82ef49b31f822ae4d1405a9a47d95e0d7b66ba65341e8478e929fff7f3cd97b2a46653de9b2bb1dac6bfe3a
-
SSDEEP
192:ekjQmigq20eI1CTCD8B1FAqop5/6oMm0RDL4Y9eYDY+KkPm:ekUmOMWCTCG2IoMBn410B5O
Score3/10 -
-
-
Target
table.jar
-
Size
30KB
-
MD5
48b580a4829be6e7900834af2b61d2c4
-
SHA1
059d8a4556b592cafee7c9c0dd494af775643fbd
-
SHA256
5713b5bdd6d35eaa1b5700acd8312411592455936a77979c83bad0c60edbc664
-
SHA512
7741edc1d988a35fab773b515cb9c3c593cd2394b837c3b0d0a48d0c49df426374e8372962502628f7a6f99a1d4ee42b1ad90ba611c753d3a735f2dbffd1d01d
-
SSDEEP
768:QJC7Zne9MdadwI+Ce16aoUc71ba0U5mrYgKDV:4WdSMduDs6TU6LcDV
Score1/10 -
-
-
Target
tabnanny.py
-
Size
11KB
-
MD5
1d2d43f06f2260a4d339eb17a4763725
-
SHA1
1bd89ee93df3a88a99e4d5d9b14178a59fc38ab4
-
SHA256
8eb11e7261ac0bb30dd98a82e973ff29503e32fe1a0682499835aaa3e3a4d653
-
SHA512
07e75598c5411a2159bd621ebf48518538c1dc9701e2b76c5135cd170e841ff291d52a43fd0568b90d381aa409b7d820413ca7dcbc5f00d505dfe6efb0b40a4d
-
SSDEEP
192:GKRZQZpL3/wvmBDw6Vhc2EdYyNc2hHvsX4F4OGDhbId2nUPrXPLPOGtC6P6/fM:ZMpLvOmdw+DEdYyNnhHvsX4F4OGDhsgo
Score3/10 -
-
-
Target
tarfile.py
-
Size
88KB
-
MD5
284d82373a14223ff058777119582eb8
-
SHA1
86f582401058cb52e60daaeff2a66b55358f46aa
-
SHA256
12b6aff41b3f7e73139b4fb32941e435d06ed9e9d42f4fd9c2a9cda177415fe3
-
SHA512
74a5397b8e7f7080d5a75566165e0d43b0abf0a7f2acff2aa8bc65b446b7fe182e6f858f753e6523258c136681326c25227124db97db0f9d01f3ed6be12b8b8c
-
SSDEEP
768:eRErKU9V1BLAc9mmdoL6WzsK5OPRMcZi0jdrCZo963NfNID7xC:iEjpfdoL6WzsK0PdjdOZo963NfNt
Score3/10 -
-
-
Target
telnetlib.py
-
Size
26KB
-
MD5
a8758557226bcb3d71c5fee9fa513020
-
SHA1
50a72c21c521c2b95aea002ec94cf94499d7c4cb
-
SHA256
7852298241ce34d1b08ec1d079b0280c331cc4ab5b41a4c17bfecd055a372c7d
-
SHA512
cbead1cd8cec31afd519ea9695997695715aa627ee3cfc47d6a35cc24c4092efb507a9cf289c3ece62210f7ea7d7b71a4de224e6c467081bc42635ed932d7b36
-
SSDEEP
384:Vp6pRh1i1Lo430tyvL74zTOpyHCVZellNBbt6aUQ4wEQN:Vsh1ipo+0tyvL7sOpyHCVAllN7
Score3/10 -
-
-
Target
tempfile.py
-
Size
19KB
-
MD5
147421b83f28bcbe5da60a8e1952a585
-
SHA1
98a78cb579e343d9f8f86edf8775ac78807a2ea4
-
SHA256
998a652c7f807b0dcc8e24949c88848c48e6819193138bf0135cc7d5fa8d9150
-
SHA512
35feb1c5c84029ce31cbb0cf54ccfdd115b038155912c74b97df69f1fc38f89305abf3966c5d5583b46316830e93fa1adf604ef64c31fd2e37cccabb495d5358
-
SSDEEP
384:eGech4xEGP/RkH6/dr8c4Mq7GKg3Z7oHK6i:NecPGHRe6/drl4Mq7tg3Z7oxi
Score3/10 -
-
-
Target
textoutstream.uno.dll
-
Size
22KB
-
MD5
c27254aed7ac9cfbc61e6dbd51904968
-
SHA1
6022370f585a9d9ea0618140b100e1eac9e33cce
-
SHA256
2fbe6c29e6de2906e72ec84bbe03f42a055111ba6768512045b2d4745d63d547
-
SHA512
fa3503a3e550f81105fe72ed666c0f3f9b071b0494edaa0a70c24c1c049acd80bb2360b49dd6355d0743521c5256dc2bf3b07823b3f4c500ab676424fd4567b7
-
SSDEEP
384:D9ewMvchS2fZ6a2JdPzf2KrqbJk+E1SeWXOOVlvtnKyiL6:AwB0Pzf3qlkqXOIHKyP
Score3/10 -
-
-
Target
openoffice4115.msi
-
Size
2.4MB
-
MD5
63d6263904b3783c61f70232bc6b0749
-
SHA1
140cc43faf463b74a60805aa80711a75b352ae18
-
SHA256
a63fc1a0b7664e6c62d5f4d277c8bb46c3ddbf2c941c92ebe97a452e0a493590
-
SHA512
3c6ed5d9a830801fff7fc0013de4e4f60b9fc00c3c43351a1739228e5278bd95d226b022e0341ec7cd0fe6faa7934ac517f11a116cf3d00b9f35bae1c7dab31d
-
SSDEEP
24576:vLwe12pZVGZwyYvyQG0VgiUJ3SB9mmYSsu84B9kwIuSx:vLwegpTGfktUtI1B3
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
readmes/readme_es.html
-
Size
12KB
-
MD5
0d173c8f143e510b74a3eef69ce03a72
-
SHA1
b3fad3a4e1ef12023fc027b7c501abc37426eb51
-
SHA256
04fe1370099e739115463c1bd61413659846bf650fd5bed4fa8ec5929bb38716
-
SHA512
546f55f91b4c9d0fa07c168e5f5ad34cce413340d3161aeac68a84348d375ae59dfb7105e0eef29955fc326b1a1c854f674b19ea8a2e97ee576a71e249f5077c
-
SSDEEP
192:Ln0yPTAkd2JmSC/nVphn+LzSfQqm3DkBto/f2I+vqjHsQsUG6rIG3D:oy12JmV/nV+LuIk7el+Q3XrxD
Score4/10 -
-
-
Target
redist/vcredist_x64.exe
-
Size
5.0MB
-
MD5
e2ada570911edaaae7d1b3c979345fce
-
SHA1
a7c83077b8a28d409e36316d2d7321fa0ccdb7e8
-
SHA256
b811f2c047a3e828517c234bd4aa4883e1ec591d88fad21289ae68a6915a6665
-
SHA512
b890d83d36f3681a690828d8926139b4f13f8d2fcd258581542cf2fb7dce5d7e7e477731c9545a54a476ed5c2aaac44ce12d2c3d9b99c2c1c04a5ab4ee20c4b8
-
SSDEEP
98304:98I8/pCVmdbx2rU/xFnTBU8UeNeagEXtIgvjyGFDdo85qyKYr5NM62dNKViClWPg:9Avx2rw5Th8XeNyGtW0DJr5uDdQdWPet
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
redist/vcredist_x86.exe
-
Size
4.3MB
-
MD5
35da2bf2befd998980a495b6f4f55e60
-
SHA1
470640aa4bb7db8e69196b5edb0010933569e98d
-
SHA256
6b3e4c51c6c0e5f68c8a72b497445af3dbf976394cbb62aa23569065c28deeb6
-
SHA512
bf630667c87b8f10ef85b61f2f379d7ce24124618b999babfec8e2df424eb494b8f1bf0977580810dff5124d4dbdec9539ff53e0dc14625c076fa34dfe44e3f2
-
SSDEEP
98304:vT4tlQ0aeY51XNURYxaA6qjEb9tRuPmBmWBDLTMTtbslyzRt9cuISY6Qa:vKlhE9U6476itR+mLPw6lyZY61
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
setup.exe
-
Size
468KB
-
MD5
5b8919735858ed14281644d2c240100e
-
SHA1
7f6375515e18679cf457f2bad67892db5a217555
-
SHA256
b78712b6fbe78bbdb57b25f985262e38e061811e244aa39297fd5a0c91d80ffa
-
SHA512
34d8faa0a71f02afff0699be326962938c36c55ba175a35f6a214bc1038f0bd1731f9a2566651a4dc932fc7814aa11bfec4533e5fe499dba3dfef910547c8ad4
-
SSDEEP
6144:w1p3HAzqXU1jsNVRbIf7m6A5f4LT9XTj8Tu6eezwJ:w1p3H6mUlKVRcf7lUsXcTus
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1