General

  • Target

    4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9

  • Size

    12KB

  • Sample

    240522-2a8lmabc46

  • MD5

    98aaca320e0f19a57d606415e5b2dd83

  • SHA1

    1a1211bc9bf9a7df0844f160f25e04bb0f55c1c6

  • SHA256

    4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9

  • SHA512

    f48a48f3d893fceb3282d29c7d1324513f7c21795009f5903981d0fcf1b1471e520dd802c483e19c45d49a1269593b83f4b230fae96c255b2cd14b37f2eb5ab1

  • SSDEEP

    192:TL29RBzDzeobchBj8JONSONuMpruQrEPEjr7Ahp:P29jnbcvYJOvhuQvr7Cp

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9

    • Size

      12KB

    • MD5

      98aaca320e0f19a57d606415e5b2dd83

    • SHA1

      1a1211bc9bf9a7df0844f160f25e04bb0f55c1c6

    • SHA256

      4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9

    • SHA512

      f48a48f3d893fceb3282d29c7d1324513f7c21795009f5903981d0fcf1b1471e520dd802c483e19c45d49a1269593b83f4b230fae96c255b2cd14b37f2eb5ab1

    • SSDEEP

      192:TL29RBzDzeobchBj8JONSONuMpruQrEPEjr7Ahp:P29jnbcvYJOvhuQvr7Cp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks