General

  • Target

    a4fdb820fdc13f28fc7e220d26699265e080f13496f1a88c512d5d64a214fad5

  • Size

    12KB

  • Sample

    240522-18e7asah9x

  • MD5

    8336d3bca9349303e954779bd885f51c

  • SHA1

    6dc5cc3bd293c31089ee2e1c748005d014ecaf79

  • SHA256

    a4fdb820fdc13f28fc7e220d26699265e080f13496f1a88c512d5d64a214fad5

  • SHA512

    90466d01cc18b794c790bbf63b01ead6d8ad1e086fffeb97ae04a9d13546a70de507bb0a41c5ecf07eaa8dbcb3cee69719872b6ee8c93582e0482198d1a8e171

  • SSDEEP

    192:KL29RBzDzeobchBj8JONcONeVNru1rEPEjr7AhP:029jnbcvYJOt4Hu1vr7CP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a4fdb820fdc13f28fc7e220d26699265e080f13496f1a88c512d5d64a214fad5

    • Size

      12KB

    • MD5

      8336d3bca9349303e954779bd885f51c

    • SHA1

      6dc5cc3bd293c31089ee2e1c748005d014ecaf79

    • SHA256

      a4fdb820fdc13f28fc7e220d26699265e080f13496f1a88c512d5d64a214fad5

    • SHA512

      90466d01cc18b794c790bbf63b01ead6d8ad1e086fffeb97ae04a9d13546a70de507bb0a41c5ecf07eaa8dbcb3cee69719872b6ee8c93582e0482198d1a8e171

    • SSDEEP

      192:KL29RBzDzeobchBj8JONcONeVNru1rEPEjr7AhP:029jnbcvYJOt4Hu1vr7CP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks