General

  • Target

    8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61

  • Size

    1.3MB

  • Sample

    210511-rwp7kl4av2

  • MD5

    3a3559db7757ea0b902c221e89741319

  • SHA1

    13b015396f281c059c2d8def984e75f81bc656fe

  • SHA256

    8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61

  • SHA512

    529ffc076c2a9a47e124fd1fcf82633539e860df2a347acbd358d6ad82319236d6b0107704ee0bd404b018774248c04d4140867c649adaddbf76419718e8644c

Score
8/10

Malware Config

Targets

    • Target

      8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61

    • Size

      1.3MB

    • MD5

      3a3559db7757ea0b902c221e89741319

    • SHA1

      13b015396f281c059c2d8def984e75f81bc656fe

    • SHA256

      8862174f75144241ed94e5b40d2985c74a4d7d3c708b6820d89c957893c31a61

    • SHA512

      529ffc076c2a9a47e124fd1fcf82633539e860df2a347acbd358d6ad82319236d6b0107704ee0bd404b018774248c04d4140867c649adaddbf76419718e8644c

    Score
    8/10
    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks