General

  • Target

    f05b52e41f6cad148f34b5d78dcaa6cd6a65312a48968aeb8f5f84892d17a57f

  • Size

    12KB

  • Sample

    240522-11pe1aaf3w

  • MD5

    6321f554ec99ff681c8d36a21b6efeb7

  • SHA1

    da6c41cde2c07cdfa094309467046f7772a9938c

  • SHA256

    f05b52e41f6cad148f34b5d78dcaa6cd6a65312a48968aeb8f5f84892d17a57f

  • SHA512

    46b7c5607a197774017162ceb9c2f6e4e7705802c8e739b08c53d9609081bcd97b51a7c0e855c987d13765793d4fe8ba03169b2d0bacfae5981e99b4dfc9b83e

  • SSDEEP

    192:YL29RBzDzeobchBj8JON+tONyruVrEPEjr7AhT:W29jnbcvYJOA84uVvr7CT

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      f05b52e41f6cad148f34b5d78dcaa6cd6a65312a48968aeb8f5f84892d17a57f

    • Size

      12KB

    • MD5

      6321f554ec99ff681c8d36a21b6efeb7

    • SHA1

      da6c41cde2c07cdfa094309467046f7772a9938c

    • SHA256

      f05b52e41f6cad148f34b5d78dcaa6cd6a65312a48968aeb8f5f84892d17a57f

    • SHA512

      46b7c5607a197774017162ceb9c2f6e4e7705802c8e739b08c53d9609081bcd97b51a7c0e855c987d13765793d4fe8ba03169b2d0bacfae5981e99b4dfc9b83e

    • SSDEEP

      192:YL29RBzDzeobchBj8JON+tONyruVrEPEjr7AhT:W29jnbcvYJOA84uVvr7CT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks