General

  • Target

    71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c

  • Size

    12KB

  • Sample

    240522-2c6j2sbd37

  • MD5

    0b19f67b42540a587979c750c9a1524c

  • SHA1

    8aa1924734ee7bddc3ef4febf4d442ea579b5b68

  • SHA256

    71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c

  • SHA512

    e4f0e4d9be1407c8cb05a1b3d212ce118ec714ef80c0d077647ac1d5d9c228f3f2a77ec41c0a0377a1ee77f4c54534e7f832777ce25972e400f4416c27162d22

  • SSDEEP

    192:JL29RBzDzeobchBj8JONoONtPruYrEPEjr7AhL:p29jnbcvYJOl7uYvr7CL

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c

    • Size

      12KB

    • MD5

      0b19f67b42540a587979c750c9a1524c

    • SHA1

      8aa1924734ee7bddc3ef4febf4d442ea579b5b68

    • SHA256

      71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c

    • SHA512

      e4f0e4d9be1407c8cb05a1b3d212ce118ec714ef80c0d077647ac1d5d9c228f3f2a77ec41c0a0377a1ee77f4c54534e7f832777ce25972e400f4416c27162d22

    • SSDEEP

      192:JL29RBzDzeobchBj8JONoONtPruYrEPEjr7AhL:p29jnbcvYJOl7uYvr7CL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks