General

  • Target

    db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3

  • Size

    12KB

  • Sample

    240522-245rtsce86

  • MD5

    ca358ecda2007d5b14aa7b01e213abd1

  • SHA1

    1914d185732fa3e13a6c3052cd5757a93d793e88

  • SHA256

    db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3

  • SHA512

    3a53f732c108410f5800cacfaeb445efc2f82f107c128eea02183f13ab8d2b9637de841b246857d1bb2efa9d264fc8867a8a457affb38bba2dab5f6b259d810c

  • SSDEEP

    192:lL29RBzDzeobchBj8JON8ON8rulrEPEjr7Ahn:d29jnbcvYJONuulvr7Cn

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3

    • Size

      12KB

    • MD5

      ca358ecda2007d5b14aa7b01e213abd1

    • SHA1

      1914d185732fa3e13a6c3052cd5757a93d793e88

    • SHA256

      db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3

    • SHA512

      3a53f732c108410f5800cacfaeb445efc2f82f107c128eea02183f13ab8d2b9637de841b246857d1bb2efa9d264fc8867a8a457affb38bba2dab5f6b259d810c

    • SSDEEP

      192:lL29RBzDzeobchBj8JON8ON8rulrEPEjr7Ahn:d29jnbcvYJONuulvr7Cn

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks