General

  • Target

    2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c

  • Size

    12KB

  • Sample

    240522-2rw9xsca44

  • MD5

    468838044ce224f9e08296f4a6ce5ad0

  • SHA1

    140ffc092c32ebda7ad2c9d2579e931cf935e8b5

  • SHA256

    2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c

  • SHA512

    d3641a753227692caaacdfb0c989b6eadc6649f9442c3e34f481372dfefc5e3235daa714480608f053e2ea3c59a9c45f1be51308385f0480b48b09dcff0c609e

  • SSDEEP

    192:FL29RBzDzeobchBj8JONzONfrucrEPEjr7Ahk1:929jnbcvYJOgxucvr7CE

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c

    • Size

      12KB

    • MD5

      468838044ce224f9e08296f4a6ce5ad0

    • SHA1

      140ffc092c32ebda7ad2c9d2579e931cf935e8b5

    • SHA256

      2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c

    • SHA512

      d3641a753227692caaacdfb0c989b6eadc6649f9442c3e34f481372dfefc5e3235daa714480608f053e2ea3c59a9c45f1be51308385f0480b48b09dcff0c609e

    • SSDEEP

      192:FL29RBzDzeobchBj8JONzONfrucrEPEjr7Ahk1:929jnbcvYJOgxucvr7CE

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks