General

  • Target

    b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406

  • Size

    12KB

  • Sample

    240522-3j77wsdc71

  • MD5

    0ee68e4ffc2bd5cd6036920ee818d792

  • SHA1

    deb3b3f307d7e7d9b00e299079c7f07549aa7fc9

  • SHA256

    b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406

  • SHA512

    913d5877b011e72d098f79147b3df137afaf8b0a77e903b64b77cfc161f573bdda16f1a31260a8aca22db53bd31c46c4ce9f92abe596892789c262ec6a49bcc3

  • SSDEEP

    192:aL29RBzDzeobchBj8JONy1ONl2Aru3rEPEjr7AhV:E29jnbcvYJOkET24u3vr7CV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406

    • Size

      12KB

    • MD5

      0ee68e4ffc2bd5cd6036920ee818d792

    • SHA1

      deb3b3f307d7e7d9b00e299079c7f07549aa7fc9

    • SHA256

      b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406

    • SHA512

      913d5877b011e72d098f79147b3df137afaf8b0a77e903b64b77cfc161f573bdda16f1a31260a8aca22db53bd31c46c4ce9f92abe596892789c262ec6a49bcc3

    • SSDEEP

      192:aL29RBzDzeobchBj8JONy1ONl2Aru3rEPEjr7AhV:E29jnbcvYJOkET24u3vr7CV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks