General

  • Target

    3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435

  • Size

    12KB

  • Sample

    240522-2pjaaabg9w

  • MD5

    e8fe86b382506efd1be93ca5f352ca64

  • SHA1

    bbb1763a68611e5c2de32c877aba160c141139ab

  • SHA256

    3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435

  • SHA512

    5a8803adc697b77d1f6d1d890fd7379d608fa12e0ec24ba635c2502ad195deed97cc8975999931d00f5719168316921562e1e3549dcbaf771ebfb14c7f124df8

  • SSDEEP

    192:cL29RBzDzeobchBj8JON9ONwruwrEPEjr7Ah6:y29jnbcvYJOuiuwvr7C6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435

    • Size

      12KB

    • MD5

      e8fe86b382506efd1be93ca5f352ca64

    • SHA1

      bbb1763a68611e5c2de32c877aba160c141139ab

    • SHA256

      3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435

    • SHA512

      5a8803adc697b77d1f6d1d890fd7379d608fa12e0ec24ba635c2502ad195deed97cc8975999931d00f5719168316921562e1e3549dcbaf771ebfb14c7f124df8

    • SSDEEP

      192:cL29RBzDzeobchBj8JON9ONwruwrEPEjr7Ah6:y29jnbcvYJOuiuwvr7C6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks