General

  • Target

    adf7a959c5811b91c0a4caf2acb794129a1faed7318e16aba22fd49d039bcd28

  • Size

    939KB

  • Sample

    210509-nadgqk7f5e

  • MD5

    3c421e69d0be9accecfe6ace1928c3c6

  • SHA1

    33d3c93af60f4702e34d6d435affff390bcbe897

  • SHA256

    adf7a959c5811b91c0a4caf2acb794129a1faed7318e16aba22fd49d039bcd28

  • SHA512

    7fefb37f607147d320477ad2156bc2f7f428ba3de3f29532fcef0dd327285f74e6355ae032fa495ccb785eb254dba51609f457c13b368764528f9bbfcc6021b3

Malware Config

Targets

    • Target

      adf7a959c5811b91c0a4caf2acb794129a1faed7318e16aba22fd49d039bcd28

    • Size

      939KB

    • MD5

      3c421e69d0be9accecfe6ace1928c3c6

    • SHA1

      33d3c93af60f4702e34d6d435affff390bcbe897

    • SHA256

      adf7a959c5811b91c0a4caf2acb794129a1faed7318e16aba22fd49d039bcd28

    • SHA512

      7fefb37f607147d320477ad2156bc2f7f428ba3de3f29532fcef0dd327285f74e6355ae032fa495ccb785eb254dba51609f457c13b368764528f9bbfcc6021b3

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks