General

  • Target

    9e8c1bee74185e37466085cdb60f1fb59f6be652b3b68017fef9f273fd65da49

  • Size

    12KB

  • Sample

    240522-2f7lhsbe63

  • MD5

    7bbe76f3ba36c6e73ba6da085d5ab77a

  • SHA1

    50cf6b30fcf3cde5e06915d2c54ab71ea6dc354f

  • SHA256

    9e8c1bee74185e37466085cdb60f1fb59f6be652b3b68017fef9f273fd65da49

  • SHA512

    713d9da985a759386f1d758e2b6075f5c1743cda20d68a4a116dca61baa1764b9a28d0a404254015e5e661ebbd4ae45ef63fcb533739c24594e11cb1675065c6

  • SSDEEP

    192:tL29RBzDzeobchBj8JON3ON0GrubrEPEjr7AhhK:V29jnbcvYJOgFubvr7CY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      9e8c1bee74185e37466085cdb60f1fb59f6be652b3b68017fef9f273fd65da49

    • Size

      12KB

    • MD5

      7bbe76f3ba36c6e73ba6da085d5ab77a

    • SHA1

      50cf6b30fcf3cde5e06915d2c54ab71ea6dc354f

    • SHA256

      9e8c1bee74185e37466085cdb60f1fb59f6be652b3b68017fef9f273fd65da49

    • SHA512

      713d9da985a759386f1d758e2b6075f5c1743cda20d68a4a116dca61baa1764b9a28d0a404254015e5e661ebbd4ae45ef63fcb533739c24594e11cb1675065c6

    • SSDEEP

      192:tL29RBzDzeobchBj8JON3ON0GrubrEPEjr7AhhK:V29jnbcvYJOgFubvr7CY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks