General

  • Target

    e499dbd642fc2fb8dc4db16dd6d2a99fc1397d6fe6fe9b644751f2ec4178f371

  • Size

    2.2MB

  • Sample

    210511-ar48xcehka

  • MD5

    01aa30ee7124cc681702987f34aa17d1

  • SHA1

    def4bbfec82aa5e0c1227ed230b110bf7413f9c9

  • SHA256

    e499dbd642fc2fb8dc4db16dd6d2a99fc1397d6fe6fe9b644751f2ec4178f371

  • SHA512

    c3ecbdd41afeb5a3564eee26553f22d37b7d7413d64a5af815de12eaee0818a9b2d8b0647932dc357156cd8b37007829a63a1cd9e1dfce36ea5766706397c6e9

Score
8/10

Malware Config

Targets

    • Target

      e499dbd642fc2fb8dc4db16dd6d2a99fc1397d6fe6fe9b644751f2ec4178f371

    • Size

      2.2MB

    • MD5

      01aa30ee7124cc681702987f34aa17d1

    • SHA1

      def4bbfec82aa5e0c1227ed230b110bf7413f9c9

    • SHA256

      e499dbd642fc2fb8dc4db16dd6d2a99fc1397d6fe6fe9b644751f2ec4178f371

    • SHA512

      c3ecbdd41afeb5a3564eee26553f22d37b7d7413d64a5af815de12eaee0818a9b2d8b0647932dc357156cd8b37007829a63a1cd9e1dfce36ea5766706397c6e9

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks