General

  • Target

    84d43be6e8aed64316a76616d972ff02aaa435a309cd6706fccf4cbf5961abe1

  • Size

    12KB

  • Sample

    240522-1vhehaae59

  • MD5

    f8cda04272933e0ce44562472a3a9cdb

  • SHA1

    4ab581af965ea8c6e391006b01c5e54ba384cb5e

  • SHA256

    84d43be6e8aed64316a76616d972ff02aaa435a309cd6706fccf4cbf5961abe1

  • SHA512

    45e9c5d3839c5b0d0cdd0b13f200f5debab84dba988ffc7d2bde5ec9ce21118cda9cc2fc98c58fe7a1b7c82f548877119c1e1e05e3091c12a43a93a44b6f7e20

  • SSDEEP

    192:HL29RBzDzeobchBj8JONUONbruLrEPEjr7Ahn:r29jnbcvYJO5luLvr7Cn

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      84d43be6e8aed64316a76616d972ff02aaa435a309cd6706fccf4cbf5961abe1

    • Size

      12KB

    • MD5

      f8cda04272933e0ce44562472a3a9cdb

    • SHA1

      4ab581af965ea8c6e391006b01c5e54ba384cb5e

    • SHA256

      84d43be6e8aed64316a76616d972ff02aaa435a309cd6706fccf4cbf5961abe1

    • SHA512

      45e9c5d3839c5b0d0cdd0b13f200f5debab84dba988ffc7d2bde5ec9ce21118cda9cc2fc98c58fe7a1b7c82f548877119c1e1e05e3091c12a43a93a44b6f7e20

    • SSDEEP

      192:HL29RBzDzeobchBj8JONUONbruLrEPEjr7Ahn:r29jnbcvYJO5luLvr7Cn

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks