General

  • Target

    6625eeaa609f67ae8830250e280bbffbec82b50246d8fb0e36b93b70f67f4b1c

  • Size

    1.2MB

  • Sample

    210508-dexmdn37kx

  • MD5

    084b8f12958300af52abf2f09642794a

  • SHA1

    869c3de0825488d49540fcbe10c97d6b7414d919

  • SHA256

    6625eeaa609f67ae8830250e280bbffbec82b50246d8fb0e36b93b70f67f4b1c

  • SHA512

    cd203fc26d0ddb6b5b56bafddff2617615f0c6fd2bbf8d7260e70ac5f748e17c73d16a8e2875297f772cf794e1efbee1b4af485e6fee97cdb653d79f14ee6e1a

Score
8/10

Malware Config

Targets

    • Target

      6625eeaa609f67ae8830250e280bbffbec82b50246d8fb0e36b93b70f67f4b1c

    • Size

      1.2MB

    • MD5

      084b8f12958300af52abf2f09642794a

    • SHA1

      869c3de0825488d49540fcbe10c97d6b7414d919

    • SHA256

      6625eeaa609f67ae8830250e280bbffbec82b50246d8fb0e36b93b70f67f4b1c

    • SHA512

      cd203fc26d0ddb6b5b56bafddff2617615f0c6fd2bbf8d7260e70ac5f748e17c73d16a8e2875297f772cf794e1efbee1b4af485e6fee97cdb653d79f14ee6e1a

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks