General

  • Target

    49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88

  • Size

    12KB

  • Sample

    240522-1ezzlshg29

  • MD5

    923a25dd6a9cccc96fa6887c2cb27bed

  • SHA1

    7a3b91376c110de3e1f552c74d15e654efcbc6e5

  • SHA256

    49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88

  • SHA512

    af94bd9e6f73abdf7d2bca627d9a51f4ec313f3ba264bed171f6451a911a33f315ad0e382e90814435dbd2d67cfb968d0b8560363e786684509f03c521c8c851

  • SSDEEP

    192:sL29RBzDzeobchBj8JONMON03ruprEPEjr7AhH:C29jnbcvYJOZgupvr7CH

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88

    • Size

      12KB

    • MD5

      923a25dd6a9cccc96fa6887c2cb27bed

    • SHA1

      7a3b91376c110de3e1f552c74d15e654efcbc6e5

    • SHA256

      49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88

    • SHA512

      af94bd9e6f73abdf7d2bca627d9a51f4ec313f3ba264bed171f6451a911a33f315ad0e382e90814435dbd2d67cfb968d0b8560363e786684509f03c521c8c851

    • SSDEEP

      192:sL29RBzDzeobchBj8JONMON03ruprEPEjr7AhH:C29jnbcvYJOZgupvr7CH

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks