General

  • Target

    771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c.zip

  • Size

    175KB

  • Sample

    230311-tbtvvsac97

  • MD5

    8643c2c613949607df0de9def50201fc

  • SHA1

    c7013ce26b848563656ff94f8cfce093d95f1569

  • SHA256

    de5229485b1e7728be3e9334f16dcf65f78e0c28d49f0e77230bedf4a8d4a97b

  • SHA512

    8c5c095959aa07b94e39642877114654e1f9269e236c5e81b9ace75f3ead415a7d9755abaecdbeb7aa877bb66fce25d118ca29eb4f5e7e8f1fb96fd396377461

  • SSDEEP

    3072:QY2+hYB9bDCR3RZvGwrLO1RVrfD5yxqHo20AWpXhWulZ7nQ8Zety:Q16c9bRbfDYKo3AgXhrla8Z6y

Score
10/10

Malware Config

Targets

    • Target

      771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c.xlsx

    • Size

      179KB

    • MD5

      b9a157c0fd8a38c5b065892987447385

    • SHA1

      b4ef1891db1bd3d2d48603fea3c9dda252b75815

    • SHA256

      771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c

    • SHA512

      a6bd8f8b086be6a5aaa8b647aaf72deff3adf43ea0079706562fcfd09c5f8410034ed97169b1e4b2bb5ac503957edc7314c75eeba96f6ea489317776bd6c6fd3

    • SSDEEP

      3072:Bf4t2QUL7ZHLygMa6HNKb3VzH2nIZ3IfTVR90YTH9tIaZ5UbjlUbV055n1cA:Bf5fhLvMBHNKLVWwm2m9tIoUnf5nN

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks