General

  • Target

    e3c2b761ce6a188e9669480d52368f3e865499a06813d939c23ad915d49cba62

  • Size

    547KB

  • Sample

    221123-l25q2sch59

  • MD5

    1a52955778b43f45abab5e588a951128

  • SHA1

    13038a9c180a6e6ec9825b11fba951757652864b

  • SHA256

    e3c2b761ce6a188e9669480d52368f3e865499a06813d939c23ad915d49cba62

  • SHA512

    4f3567458b31ac2df6583cf4ad750c0a9afb253a691abfcf0e6f782604b4023b5e72e2f6fdf7c36d15dd64cfd5b3eb4860c4180c9fbea41cbbaf22c60e9ddaab

  • SSDEEP

    12288:DpU6okHHkvPirg1OP7uMYgLiryi9SOEYU0xiXc5XAaJ:1Upkn4rc7uMYgLirVp4gJ

Score
8/10

Malware Config

Targets

    • Target

      e3c2b761ce6a188e9669480d52368f3e865499a06813d939c23ad915d49cba62

    • Size

      547KB

    • MD5

      1a52955778b43f45abab5e588a951128

    • SHA1

      13038a9c180a6e6ec9825b11fba951757652864b

    • SHA256

      e3c2b761ce6a188e9669480d52368f3e865499a06813d939c23ad915d49cba62

    • SHA512

      4f3567458b31ac2df6583cf4ad750c0a9afb253a691abfcf0e6f782604b4023b5e72e2f6fdf7c36d15dd64cfd5b3eb4860c4180c9fbea41cbbaf22c60e9ddaab

    • SSDEEP

      12288:DpU6okHHkvPirg1OP7uMYgLiryi9SOEYU0xiXc5XAaJ:1Upkn4rc7uMYgLirVp4gJ

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

5
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks