General

  • Target

    a9dcd6d87c80da090a059e31bcd02cb21107fd09e8ade76f38dfbcbcf8bfc99d

  • Size

    834KB

  • Sample

    210509-faym9z7v72

  • MD5

    63d23949144c09b33cd549e2fbd692da

  • SHA1

    c2090ce4c360783151a34b89fe6c17470a73bf21

  • SHA256

    a9dcd6d87c80da090a059e31bcd02cb21107fd09e8ade76f38dfbcbcf8bfc99d

  • SHA512

    c4735fef33fc054ffd73ffed9df93893dda125229cc17cfcbf1cd968abf6e3a7746f2c9752d4c5b971824627b950907a2916cf9d20839a03ea0a7545ee20f5c1

Score
8/10

Malware Config

Targets

    • Target

      a9dcd6d87c80da090a059e31bcd02cb21107fd09e8ade76f38dfbcbcf8bfc99d

    • Size

      834KB

    • MD5

      63d23949144c09b33cd549e2fbd692da

    • SHA1

      c2090ce4c360783151a34b89fe6c17470a73bf21

    • SHA256

      a9dcd6d87c80da090a059e31bcd02cb21107fd09e8ade76f38dfbcbcf8bfc99d

    • SHA512

      c4735fef33fc054ffd73ffed9df93893dda125229cc17cfcbf1cd968abf6e3a7746f2c9752d4c5b971824627b950907a2916cf9d20839a03ea0a7545ee20f5c1

    Score
    8/10
    • Creates new service(s)

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks