General

  • Target

    dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618

  • Size

    12KB

  • Sample

    240522-2t3vgscb39

  • MD5

    52703d411fd572b76c4c45428f615b8d

  • SHA1

    ac99152916654579e16464a11d0e31b7e2c35e3c

  • SHA256

    dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618

  • SHA512

    06204c56ad2e3fc064619b03ce67bc7f7ebe0ca2c6ade5bca0d10e46ec97b9c25eca76974944d493ab9c8c0930b08565a3edf72655bee1dfb941b90ce0b14720

  • SSDEEP

    192:3L29RBzDzeobchBj8JONRONu+ruurEPEjr7AhW:b29jnbcvYJOO86uuvr7CW

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618

    • Size

      12KB

    • MD5

      52703d411fd572b76c4c45428f615b8d

    • SHA1

      ac99152916654579e16464a11d0e31b7e2c35e3c

    • SHA256

      dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618

    • SHA512

      06204c56ad2e3fc064619b03ce67bc7f7ebe0ca2c6ade5bca0d10e46ec97b9c25eca76974944d493ab9c8c0930b08565a3edf72655bee1dfb941b90ce0b14720

    • SSDEEP

      192:3L29RBzDzeobchBj8JONRONu+ruurEPEjr7AhW:b29jnbcvYJOO86uuvr7CW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks