General

  • Target

    98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484

  • Size

    8.8MB

  • Sample

    210511-8x2xrfw1wj

  • MD5

    e5a3dca01789308a3d67f8e32a661881

  • SHA1

    858a4bd0558eb38c8e6d67662a863a61c872331b

  • SHA256

    98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484

  • SHA512

    a2a3caafc1b323d1c9e5cf821663f607bd631935cd698b62eea8a10c56028ecdcd9235a5ec270f009b1733e8f144125b0f6bd1eaf224ad845d396e7309431053

Malware Config

Targets

    • Target

      98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484

    • Size

      8.8MB

    • MD5

      e5a3dca01789308a3d67f8e32a661881

    • SHA1

      858a4bd0558eb38c8e6d67662a863a61c872331b

    • SHA256

      98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484

    • SHA512

      a2a3caafc1b323d1c9e5cf821663f607bd631935cd698b62eea8a10c56028ecdcd9235a5ec270f009b1733e8f144125b0f6bd1eaf224ad845d396e7309431053

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks