General

  • Target

    ff1a48aaa4ca00d40d6888713626e4aa42f36fd3806b368810708a60160f56f9

  • Size

    2.6MB

  • Sample

    210511-r896hzsfv2

  • MD5

    87d3d3a927c330c16c4b628a501409df

  • SHA1

    39e79273a41f84d068bb56052e575341ee166cae

  • SHA256

    ff1a48aaa4ca00d40d6888713626e4aa42f36fd3806b368810708a60160f56f9

  • SHA512

    0f260e8304bd784acfc628f95d667fda4a335e96e169d5974ed2b136dc804d45b86321dbf1ee6f7059258a044618576dc91a2a1d9d76441e814b462d486d40ea

Score
8/10

Malware Config

Targets

    • Target

      ff1a48aaa4ca00d40d6888713626e4aa42f36fd3806b368810708a60160f56f9

    • Size

      2.6MB

    • MD5

      87d3d3a927c330c16c4b628a501409df

    • SHA1

      39e79273a41f84d068bb56052e575341ee166cae

    • SHA256

      ff1a48aaa4ca00d40d6888713626e4aa42f36fd3806b368810708a60160f56f9

    • SHA512

      0f260e8304bd784acfc628f95d667fda4a335e96e169d5974ed2b136dc804d45b86321dbf1ee6f7059258a044618576dc91a2a1d9d76441e814b462d486d40ea

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks