General

  • Target

    b0dcf69256832292ea2e1d3afc3cb2d52b936a4f559888f259ae71c505ef3e78

  • Size

    2.1MB

  • Sample

    210511-ak2dx5hcbx

  • MD5

    6cf44afa4d6b8ad8d30341380e791c85

  • SHA1

    c86558a81852587727fd8f2ef2d5fbc112e87690

  • SHA256

    b0dcf69256832292ea2e1d3afc3cb2d52b936a4f559888f259ae71c505ef3e78

  • SHA512

    90f2f8686cf11b694e5fd4c2b2dd5739a83a409535c9a3b2970836faec0be7d7a351436e5efa7e5e39e607879fcdc4031a7fc81bb2406348be769d02f1049849

Score
8/10

Malware Config

Targets

    • Target

      b0dcf69256832292ea2e1d3afc3cb2d52b936a4f559888f259ae71c505ef3e78

    • Size

      2.1MB

    • MD5

      6cf44afa4d6b8ad8d30341380e791c85

    • SHA1

      c86558a81852587727fd8f2ef2d5fbc112e87690

    • SHA256

      b0dcf69256832292ea2e1d3afc3cb2d52b936a4f559888f259ae71c505ef3e78

    • SHA512

      90f2f8686cf11b694e5fd4c2b2dd5739a83a409535c9a3b2970836faec0be7d7a351436e5efa7e5e39e607879fcdc4031a7fc81bb2406348be769d02f1049849

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks