General

  • Target

    violett.zip

  • Size

    14.1MB

  • Sample

    221123-qa36csge6t

  • MD5

    9289a8dcbb295987ccb948df1fec6671

  • SHA1

    e860dd58e06f7afc326887d0e0258fc605e7d9e7

  • SHA256

    6bda3e2b454fc9946b572c8e43a3e9e3105931a94a69073c93cd507333a70886

  • SHA512

    ba8b3713d3ebf763a85b6f1b216b78fc05ed79c26fa2ad6f57c5e0c3019f560589623218ba2892205765dc4096383f7dcb4b8c6aac59d52c1580797eb8c91f3d

  • SSDEEP

    393216:hDRPy+KjZXOUz+u02sHjOjxQ2ibf+Qfxf3+ILlMo9/TjcpNcR2jo04:hDsvpOYky9Q2Wf1fVrMA/T8cRN04

Score
8/10

Malware Config

Targets

    • Target

      violett/violett_checker.exe

    • Size

      16.7MB

    • MD5

      8b19826d2a8fb9801d8e33b668fbb435

    • SHA1

      940b8ef66a98f89ac19b40bd738e4f4efedf5445

    • SHA256

      3cd716bb2a413584ddd75c8dbc813e337c77e8ae424353f9ade226f25de81813

    • SHA512

      3dd6da80af4617ad2f8755773ad719455138a6b4d612061755e4ab5d278cfee936d57bf6bc770ee74bdd1313640b33043d4c9e52258b4d33532453c1619c62bd

    • SSDEEP

      393216:5naV9L0TrymvAHgUMJv39kRe5FMMpjAMhVuVOPW:U9L06mpbv3nvpjAMhV8O

    Score
    8/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks