General

  • Target

    166a9f6d28058d881fbe360c9672e33b340a6200a3527554a50fb4b19570b9af

  • Size

    886KB

  • Sample

    210508-gakhydjm5n

  • MD5

    7f5cf1e7a73870e549cddbd7545c2603

  • SHA1

    8d6da3aee6db037d745b0188f59a80aecffe29e6

  • SHA256

    166a9f6d28058d881fbe360c9672e33b340a6200a3527554a50fb4b19570b9af

  • SHA512

    5c69e2d2c916821ad20c19eb8270bd14315a37647e22909d9844c75bf363b0249dd21a2a6e8e75daf476f6943b16e4695b375db760147ac18fc3effb3a21ade9

Score
8/10

Malware Config

Targets

    • Target

      166a9f6d28058d881fbe360c9672e33b340a6200a3527554a50fb4b19570b9af

    • Size

      886KB

    • MD5

      7f5cf1e7a73870e549cddbd7545c2603

    • SHA1

      8d6da3aee6db037d745b0188f59a80aecffe29e6

    • SHA256

      166a9f6d28058d881fbe360c9672e33b340a6200a3527554a50fb4b19570b9af

    • SHA512

      5c69e2d2c916821ad20c19eb8270bd14315a37647e22909d9844c75bf363b0249dd21a2a6e8e75daf476f6943b16e4695b375db760147ac18fc3effb3a21ade9

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks