General

  • Target

    e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576

  • Size

    12KB

  • Sample

    240522-2b33jabb6s

  • MD5

    358eda16dd3dfa8afa2449b0ec68d11c

  • SHA1

    25d80cb6a52b056d1191ea85ece03310c65c3667

  • SHA256

    e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576

  • SHA512

    7e2e2f583705b8d998b5a1ddc354c2ca00287fc62f036ed05148447eba2a42f0111328a91c94c606e2407e34c4c07b30d136e962d3ff78b652071b0d0819654e

  • SSDEEP

    192:4L29RBzDzeobchBj8JONLONIMruLrEPEjr7AhM:229jnbcvYJOMesuLvr7CM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576

    • Size

      12KB

    • MD5

      358eda16dd3dfa8afa2449b0ec68d11c

    • SHA1

      25d80cb6a52b056d1191ea85ece03310c65c3667

    • SHA256

      e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576

    • SHA512

      7e2e2f583705b8d998b5a1ddc354c2ca00287fc62f036ed05148447eba2a42f0111328a91c94c606e2407e34c4c07b30d136e962d3ff78b652071b0d0819654e

    • SSDEEP

      192:4L29RBzDzeobchBj8JONLONIMruLrEPEjr7AhM:229jnbcvYJOMesuLvr7CM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks