General

  • Target

    807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991

  • Size

    12KB

  • Sample

    240522-25ks2sce9v

  • MD5

    a4ac95c5df2cd54fa0b8444a6cd0c720

  • SHA1

    f6ed1e0490150675e4fcdf848ddba4de722a5ae3

  • SHA256

    807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991

  • SHA512

    abbf577d78cee72b07a7c9061a43bfa74209b3c92609de2710ee78920e810b776fd9235538e29e8ac053de149f41ed64653184e895ad589ec80f7f4cd2594b7b

  • SSDEEP

    192:BL29RBzDzeobchBj8JONEONdru1rEPEjr7Ahv:R29jnbcvYJOpnu1vr7Cv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991

    • Size

      12KB

    • MD5

      a4ac95c5df2cd54fa0b8444a6cd0c720

    • SHA1

      f6ed1e0490150675e4fcdf848ddba4de722a5ae3

    • SHA256

      807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991

    • SHA512

      abbf577d78cee72b07a7c9061a43bfa74209b3c92609de2710ee78920e810b776fd9235538e29e8ac053de149f41ed64653184e895ad589ec80f7f4cd2594b7b

    • SSDEEP

      192:BL29RBzDzeobchBj8JONEONdru1rEPEjr7Ahv:R29jnbcvYJOpnu1vr7Cv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks