General

  • Target

    50c47809c67faedb6bbaac93c480e6f0a9f7f0905551d57d5f7a025cb32a068e

  • Size

    12KB

  • Sample

    240522-1vx5ysae73

  • MD5

    19e055414a4c17a2f65fbfd5dc31ee7b

  • SHA1

    b112313f283612b559e660d00ca9ea7b70cf475e

  • SHA256

    50c47809c67faedb6bbaac93c480e6f0a9f7f0905551d57d5f7a025cb32a068e

  • SHA512

    323fc48fb9a56058e615c24de41ce41a8e2979fdb63e1e6661ca8d90f69b1484c424113eaac080aadfaa0f28ea923d10d9496baccc9fbcfb67127fddad4a221a

  • SSDEEP

    192:JL29RBzDzeobchBj8JONhON6rufrEPEjr7Ah2:p29jnbcvYJOawufvr7C2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      50c47809c67faedb6bbaac93c480e6f0a9f7f0905551d57d5f7a025cb32a068e

    • Size

      12KB

    • MD5

      19e055414a4c17a2f65fbfd5dc31ee7b

    • SHA1

      b112313f283612b559e660d00ca9ea7b70cf475e

    • SHA256

      50c47809c67faedb6bbaac93c480e6f0a9f7f0905551d57d5f7a025cb32a068e

    • SHA512

      323fc48fb9a56058e615c24de41ce41a8e2979fdb63e1e6661ca8d90f69b1484c424113eaac080aadfaa0f28ea923d10d9496baccc9fbcfb67127fddad4a221a

    • SSDEEP

      192:JL29RBzDzeobchBj8JONhON6rufrEPEjr7Ah2:p29jnbcvYJOawufvr7C2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks