General

  • Target

    a9c21bfee2e45a4884acbd2cd71200a0bc9ee6d8fc1cc371fb55c79767f00013

  • Size

    12KB

  • Sample

    240522-14hrmaah67

  • MD5

    cdcce6a8de8c0a870fc158f653c55504

  • SHA1

    8598e60cfbdf1cf4bf4f5f8107d67f1406fd405f

  • SHA256

    a9c21bfee2e45a4884acbd2cd71200a0bc9ee6d8fc1cc371fb55c79767f00013

  • SHA512

    1f0b7f5dcc8ef3f078e5722301df4ad2ca4b4e49e589bdfc930d1f62a5dff5762563e4bcfbb69fd08efef45864e938e949a41629bf1a82006548421f692341f7

  • SSDEEP

    192:rL29RBzDzeobchBj8JONpON4IXurulrEPEjr7Ahu:X29jnbcvYJOyKIXqulvr7Cu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a9c21bfee2e45a4884acbd2cd71200a0bc9ee6d8fc1cc371fb55c79767f00013

    • Size

      12KB

    • MD5

      cdcce6a8de8c0a870fc158f653c55504

    • SHA1

      8598e60cfbdf1cf4bf4f5f8107d67f1406fd405f

    • SHA256

      a9c21bfee2e45a4884acbd2cd71200a0bc9ee6d8fc1cc371fb55c79767f00013

    • SHA512

      1f0b7f5dcc8ef3f078e5722301df4ad2ca4b4e49e589bdfc930d1f62a5dff5762563e4bcfbb69fd08efef45864e938e949a41629bf1a82006548421f692341f7

    • SSDEEP

      192:rL29RBzDzeobchBj8JONpON4IXurulrEPEjr7Ahu:X29jnbcvYJOyKIXqulvr7Cu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks