General

  • Target

    a5a94b659b84c1420c1579553228fd553edc60f4be53d49c9fb7007304cc5db0

  • Size

    2.2MB

  • Sample

    210509-d87amv3bve

  • MD5

    9a3d14dd493c2a25d9db58184bbf3c4a

  • SHA1

    f4673116befd4ac121a2d0c4b6b4c8c5a9a74c1b

  • SHA256

    a5a94b659b84c1420c1579553228fd553edc60f4be53d49c9fb7007304cc5db0

  • SHA512

    4c233d8e5162578b05b4adc5f108e56adfb9fdcdd5cf4b6caf89e5aaf50f3babfc56b56d89c0b0ec1d0827ca42df305a4eeea399f1979926631149cc9b568f95

Score
8/10

Malware Config

Targets

    • Target

      a5a94b659b84c1420c1579553228fd553edc60f4be53d49c9fb7007304cc5db0

    • Size

      2.2MB

    • MD5

      9a3d14dd493c2a25d9db58184bbf3c4a

    • SHA1

      f4673116befd4ac121a2d0c4b6b4c8c5a9a74c1b

    • SHA256

      a5a94b659b84c1420c1579553228fd553edc60f4be53d49c9fb7007304cc5db0

    • SHA512

      4c233d8e5162578b05b4adc5f108e56adfb9fdcdd5cf4b6caf89e5aaf50f3babfc56b56d89c0b0ec1d0827ca42df305a4eeea399f1979926631149cc9b568f95

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks