General

  • Target

    8950fc9ae8624b1f3523bc783f7fb1ca4072ef0bbc728dc2a47c79ecbf3e6ed4

  • Size

    12KB

  • Sample

    240522-1rgc2aab7s

  • MD5

    87bd426f3ab19ee1b2581cfb944c6494

  • SHA1

    7ac2c744511311be0644a5ce17f2b06a684bf7f5

  • SHA256

    8950fc9ae8624b1f3523bc783f7fb1ca4072ef0bbc728dc2a47c79ecbf3e6ed4

  • SHA512

    638dc114dd8bcdaf7ad5348f42328bab5d8df008432ed31d6834a80d4bb3e66facf549ef5cd44a35265c6c8bdc71e5f92813a2a418e0f702330438b6ec875024

  • SSDEEP

    192:zL29RBzDzeobchBj8JONdONuruGIrEPEjr7AhS:v29jnbcvYJOawutvr7CS

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      8950fc9ae8624b1f3523bc783f7fb1ca4072ef0bbc728dc2a47c79ecbf3e6ed4

    • Size

      12KB

    • MD5

      87bd426f3ab19ee1b2581cfb944c6494

    • SHA1

      7ac2c744511311be0644a5ce17f2b06a684bf7f5

    • SHA256

      8950fc9ae8624b1f3523bc783f7fb1ca4072ef0bbc728dc2a47c79ecbf3e6ed4

    • SHA512

      638dc114dd8bcdaf7ad5348f42328bab5d8df008432ed31d6834a80d4bb3e66facf549ef5cd44a35265c6c8bdc71e5f92813a2a418e0f702330438b6ec875024

    • SSDEEP

      192:zL29RBzDzeobchBj8JONdONuruGIrEPEjr7AhS:v29jnbcvYJOawutvr7CS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks