General

  • Target

    4681770f76c533074428617f82cbfe944c41827d8f0989e7e89698f6635919cd

  • Size

    87KB

  • Sample

    220707-kg1e6abca3

  • MD5

    6fc7bf9bf2c166b4f43eaae50520799e

  • SHA1

    4f7d159930cbe34dcb3010a246be01557b5add68

  • SHA256

    4681770f76c533074428617f82cbfe944c41827d8f0989e7e89698f6635919cd

  • SHA512

    3849a6bbc5a3124cf071c5d6fbc6967197ff7329bddf0f80f54870537e7a74a6cd18505371adf20c5d402ca2a402cecf11382da0c0cf20f02ade0d1b84994a6e

Score
8/10

Malware Config

Targets

    • Target

      4681770f76c533074428617f82cbfe944c41827d8f0989e7e89698f6635919cd

    • Size

      87KB

    • MD5

      6fc7bf9bf2c166b4f43eaae50520799e

    • SHA1

      4f7d159930cbe34dcb3010a246be01557b5add68

    • SHA256

      4681770f76c533074428617f82cbfe944c41827d8f0989e7e89698f6635919cd

    • SHA512

      3849a6bbc5a3124cf071c5d6fbc6967197ff7329bddf0f80f54870537e7a74a6cd18505371adf20c5d402ca2a402cecf11382da0c0cf20f02ade0d1b84994a6e

    Score
    8/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks