General

  • Target

    d287388e5ff978bf6f8af477460a9b76a74fdc33535e392b70e58176fc9ad805

  • Size

    1.2MB

  • Sample

    220520-ratglafcb6

  • MD5

    365d95c0d0659a1081488460eadf8159

  • SHA1

    63a3f87be4f037585f576599823557e5444084a4

  • SHA256

    d287388e5ff978bf6f8af477460a9b76a74fdc33535e392b70e58176fc9ad805

  • SHA512

    41c49560683ee1611eb1143ca6babe650e336c33f7d58b67cb34e17e0450a9ef6b212fc318bc3601942e49acc3ba65aba86278bb6a60ac0764b9488036a4ca4a

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://bit.ly/3eIxLAZ

Targets

    • Target

      d287388e5ff978bf6f8af477460a9b76a74fdc33535e392b70e58176fc9ad805

    • Size

      1.2MB

    • MD5

      365d95c0d0659a1081488460eadf8159

    • SHA1

      63a3f87be4f037585f576599823557e5444084a4

    • SHA256

      d287388e5ff978bf6f8af477460a9b76a74fdc33535e392b70e58176fc9ad805

    • SHA512

      41c49560683ee1611eb1143ca6babe650e336c33f7d58b67cb34e17e0450a9ef6b212fc318bc3601942e49acc3ba65aba86278bb6a60ac0764b9488036a4ca4a

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks