General

  • Target

    f32490a4fb4944ac4addea0a707d5511b207f64571be4f37fd535041c4cc9a78

  • Size

    12KB

  • Sample

    240522-2yaz9scc69

  • MD5

    0e388e027d6ad35881c0f90209916643

  • SHA1

    fb216128d6b33436c0a014b362b10d9dfa0c2be6

  • SHA256

    f32490a4fb4944ac4addea0a707d5511b207f64571be4f37fd535041c4cc9a78

  • SHA512

    59492e0971103a76aacece86581dbac47b9143b94a78f39372ec75e4954d13a5f996f0d6bd2eed36c2988c5dbba136fc4616d9ceb1550d17729d3f9de5ff36a7

  • SSDEEP

    192:OL29RBzDzeobchBj8JONdONzruKrEPEjr7Ahi:A29jnbcvYJOO9uKvr7Ci

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      f32490a4fb4944ac4addea0a707d5511b207f64571be4f37fd535041c4cc9a78

    • Size

      12KB

    • MD5

      0e388e027d6ad35881c0f90209916643

    • SHA1

      fb216128d6b33436c0a014b362b10d9dfa0c2be6

    • SHA256

      f32490a4fb4944ac4addea0a707d5511b207f64571be4f37fd535041c4cc9a78

    • SHA512

      59492e0971103a76aacece86581dbac47b9143b94a78f39372ec75e4954d13a5f996f0d6bd2eed36c2988c5dbba136fc4616d9ceb1550d17729d3f9de5ff36a7

    • SSDEEP

      192:OL29RBzDzeobchBj8JONdONzruKrEPEjr7Ahi:A29jnbcvYJOO9uKvr7Ci

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks