General
-
Target
Bewertung Dokumentation.pdf
-
Size
570KB
-
Sample
250327-yg2j4syrt8
-
MD5
642dda2b02d66b2d92dd230c7f48c3e7
-
SHA1
22925e15898dfdd263e0fc4c9236ca164ca0acbd
-
SHA256
9d178a49b3dbb231676082c4b0b0dd6ed4ee16efd76260e3b5cd15c25d4c024b
-
SHA512
d592eb26b909b6c7c18afb6d49e7ab71684d3394c04b989152f7a064e0fe276ab56339b5c83972d7ece1cc6b3be90b0da3b020d101e633816f59ddab271c815a
-
SSDEEP
12288:VkzKlmqqqp7jqrQq6ysZViZIo9M38D95tYRC:mGp7jqEq6ycVyW3Y9YRC
Static task
static1
Behavioral task
behavioral1
Sample
Bewertung Dokumentation.pdf
Resource
win11-20250313-en
Malware Config
Targets
-
-
Target
Bewertung Dokumentation.pdf
-
Size
570KB
-
MD5
642dda2b02d66b2d92dd230c7f48c3e7
-
SHA1
22925e15898dfdd263e0fc4c9236ca164ca0acbd
-
SHA256
9d178a49b3dbb231676082c4b0b0dd6ed4ee16efd76260e3b5cd15c25d4c024b
-
SHA512
d592eb26b909b6c7c18afb6d49e7ab71684d3394c04b989152f7a064e0fe276ab56339b5c83972d7ece1cc6b3be90b0da3b020d101e633816f59ddab271c815a
-
SSDEEP
12288:VkzKlmqqqp7jqrQq6ysZViZIo9M38D95tYRC:mGp7jqEq6ycVyW3Y9YRC
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1