General

  • Target

    d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d

  • Size

    821KB

  • Sample

    210511-pc56glfvl6

  • MD5

    3737064e0e28b42ec8cc9957fbcc28d1

  • SHA1

    4633b678296a0b4d3529751e8667b8764a3eed4d

  • SHA256

    d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d

  • SHA512

    1ba556813b08356d151e1b5e72f688f47139880fb36033ae7e10f7661d1eadb3952edb05b54111b7da2d7fc5aedcb729f9a318e713d273e2674a06134a8402fc

Score
8/10

Malware Config

Targets

    • Target

      d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d

    • Size

      821KB

    • MD5

      3737064e0e28b42ec8cc9957fbcc28d1

    • SHA1

      4633b678296a0b4d3529751e8667b8764a3eed4d

    • SHA256

      d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d

    • SHA512

      1ba556813b08356d151e1b5e72f688f47139880fb36033ae7e10f7661d1eadb3952edb05b54111b7da2d7fc5aedcb729f9a318e713d273e2674a06134a8402fc

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks