General

  • Target

    e8aa055711bc31665a031712d6b460e6be0cf196888b3ef62a6f56bf95a3c2b0

  • Size

    880KB

  • Sample

    230322-kjl1jshg4w

  • MD5

    348ce7b1e4df8c971c664d19d3d0bf67

  • SHA1

    49844f672f2700d0a8c8bcd3a06de4aa0eafe939

  • SHA256

    e8aa055711bc31665a031712d6b460e6be0cf196888b3ef62a6f56bf95a3c2b0

  • SHA512

    24a887a0d683cb8d446deb73cd4942020026577848c0a642478f239ca4eadd9f93b9d781d944de55069135f7a504cdba99c97c244138953b0d4dc679046df2dc

  • SSDEEP

    6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7Fx1d43wUmDm:nz/9ja2ieFYp5R+I7LY

Score
10/10

Malware Config

Targets

    • Target

      e8aa055711bc31665a031712d6b460e6be0cf196888b3ef62a6f56bf95a3c2b0

    • Size

      880KB

    • MD5

      348ce7b1e4df8c971c664d19d3d0bf67

    • SHA1

      49844f672f2700d0a8c8bcd3a06de4aa0eafe939

    • SHA256

      e8aa055711bc31665a031712d6b460e6be0cf196888b3ef62a6f56bf95a3c2b0

    • SHA512

      24a887a0d683cb8d446deb73cd4942020026577848c0a642478f239ca4eadd9f93b9d781d944de55069135f7a504cdba99c97c244138953b0d4dc679046df2dc

    • SSDEEP

      6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7Fx1d43wUmDm:nz/9ja2ieFYp5R+I7LY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks