General

  • Target

    729ac3c86c5848c5c1b18c714c38e2e9514c9c010e1f8462270e82269a2399a8.exe

  • Size

    8.6MB

  • Sample

    211022-kjdzyaccbp

  • MD5

    a9f696f6e753202bbb0d5e31d6248f04

  • SHA1

    711f0c9cafaeca25675f37de88525153f383c346

  • SHA256

    729ac3c86c5848c5c1b18c714c38e2e9514c9c010e1f8462270e82269a2399a8

  • SHA512

    3e44bfb295ef9e1512c7b639749afc735827d926c395a21f4fddb0aebe1429ff141f67c3ba9d4e62d6d0aabb73b81cb8685d9428ec54ab34e4328e52b58a583c

Score
10/10

Malware Config

Targets

    • Target

      729ac3c86c5848c5c1b18c714c38e2e9514c9c010e1f8462270e82269a2399a8.exe

    • Size

      8.6MB

    • MD5

      a9f696f6e753202bbb0d5e31d6248f04

    • SHA1

      711f0c9cafaeca25675f37de88525153f383c346

    • SHA256

      729ac3c86c5848c5c1b18c714c38e2e9514c9c010e1f8462270e82269a2399a8

    • SHA512

      3e44bfb295ef9e1512c7b639749afc735827d926c395a21f4fddb0aebe1429ff141f67c3ba9d4e62d6d0aabb73b81cb8685d9428ec54ab34e4328e52b58a583c

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks