General

  • Target

    a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9

  • Size

    12.4MB

  • Sample

    210509-gknyq3vg9a

  • MD5

    1bfe1deb59ff2aba2514255d49315d4d

  • SHA1

    db74dbcf9235e7f55070bfd13db416f23ee4bb95

  • SHA256

    a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9

  • SHA512

    b86ae38eb2ea52696ab3aa0e39af3bd2fc7c6f54e9160269dd3c078064207001c9aac30a1b2bdd3ac568e52e7ff285ff2b8f988cb23c3852d30592fd30b8c2af

Score
8/10

Malware Config

Targets

    • Target

      a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9

    • Size

      12.4MB

    • MD5

      1bfe1deb59ff2aba2514255d49315d4d

    • SHA1

      db74dbcf9235e7f55070bfd13db416f23ee4bb95

    • SHA256

      a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9

    • SHA512

      b86ae38eb2ea52696ab3aa0e39af3bd2fc7c6f54e9160269dd3c078064207001c9aac30a1b2bdd3ac568e52e7ff285ff2b8f988cb23c3852d30592fd30b8c2af

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks