General

  • Target

    9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe

  • Size

    1.3MB

  • Sample

    220114-wvcrssaadp

  • MD5

    a4d367f98a1fa3e594af0875379bda39

  • SHA1

    a82d6bafcc260138eb11b4a511ff6f3e80441ce3

  • SHA256

    9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b8f3040eb8f3d29ef149

  • SHA512

    94deb8455db4863909dfccb33f7ceb128ff6a041c6e36d04d679df74fa0506443466ada3f3c13352d665e54d0440b2f086a8a599e7db914bc5e54df08f6ba547

Score
10/10

Malware Config

Targets

    • Target

      9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b.exe

    • Size

      1.3MB

    • MD5

      a4d367f98a1fa3e594af0875379bda39

    • SHA1

      a82d6bafcc260138eb11b4a511ff6f3e80441ce3

    • SHA256

      9bdcc933d0c04da1fa41ba915c460d9fa573e4bc5814b8f3040eb8f3d29ef149

    • SHA512

      94deb8455db4863909dfccb33f7ceb128ff6a041c6e36d04d679df74fa0506443466ada3f3c13352d665e54d0440b2f086a8a599e7db914bc5e54df08f6ba547

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE DCRAT Activity (GET)

      suricata: ET MALWARE DCRAT Activity (GET)

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks