General

  • Target

    184196bb279106c16e67d3ae0d29bd865267b6fcda1f41c2f5fba84fc25b9e82

  • Size

    407KB

  • Sample

    220211-fgg7cscfbr

  • MD5

    d9c3b4e5faa03bc8d83396837bd7e23c

  • SHA1

    fe391b8f10f99a5a9f7d3dcd49d8d0e9551b663e

  • SHA256

    184196bb279106c16e67d3ae0d29bd865267b6fcda1f41c2f5fba84fc25b9e82

  • SHA512

    529043ab300e6fa1efbd374e429a30cdab431fbeaae8ea2a4ba1ad322bb3cf20136057059b6d095e157c69c3153093c286304ae7a83327e2f07441db802a4a1b

Malware Config

Targets

    • Target

      184196bb279106c16e67d3ae0d29bd865267b6fcda1f41c2f5fba84fc25b9e82

    • Size

      407KB

    • MD5

      d9c3b4e5faa03bc8d83396837bd7e23c

    • SHA1

      fe391b8f10f99a5a9f7d3dcd49d8d0e9551b663e

    • SHA256

      184196bb279106c16e67d3ae0d29bd865267b6fcda1f41c2f5fba84fc25b9e82

    • SHA512

      529043ab300e6fa1efbd374e429a30cdab431fbeaae8ea2a4ba1ad322bb3cf20136057059b6d095e157c69c3153093c286304ae7a83327e2f07441db802a4a1b

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks