General

  • Target

    f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293

  • Size

    12KB

  • Sample

    240522-27qgbacf82

  • MD5

    8d70c63a8df748a07c9cc2165ba4a0b7

  • SHA1

    763339fec7706187868f9a0e889410b1fbe675d3

  • SHA256

    f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293

  • SHA512

    1b0687f78c82faadc4c952c29435b863901b8ecbb91595ffdaf50eca709d596fc878bc881e29c4bb6af3d23acadf403d873efa21e66e591f159a424b176ecb77

  • SSDEEP

    192:oL29RBzDzeobchBj8JON5ONwrudrEPEjr7Ah2:m29jnbcvYJOCWudvr7C2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293

    • Size

      12KB

    • MD5

      8d70c63a8df748a07c9cc2165ba4a0b7

    • SHA1

      763339fec7706187868f9a0e889410b1fbe675d3

    • SHA256

      f37d7bf4692b5a5e343e2d5486cee5fd373b0440e1cd94ee90b7d5aec89ef293

    • SHA512

      1b0687f78c82faadc4c952c29435b863901b8ecbb91595ffdaf50eca709d596fc878bc881e29c4bb6af3d23acadf403d873efa21e66e591f159a424b176ecb77

    • SSDEEP

      192:oL29RBzDzeobchBj8JON5ONwrudrEPEjr7Ah2:m29jnbcvYJOCWudvr7C2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks