General

  • Target

    851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19

  • Size

    12KB

  • Sample

    240522-3qtm3sde8x

  • MD5

    45d76dbc83e4ba7f8e860acbb81a5099

  • SHA1

    d33ac9b486fb0f80c27670f6c05c4e00785d5eae

  • SHA256

    851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19

  • SHA512

    497277580506aabc7b34f1024aa376a2c68d02b1fc8a1c7404562802d1ae41d6aa4eedd8ef1194457eb44cfb3869ff37eaaf2bc9ed1efa07212315bf91b2eae6

  • SSDEEP

    192:QL29RBzDzeobchBj8JONqONkEruorEPEjr7Ahh:+29jnbcvYJOHXuovr7Ch

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19

    • Size

      12KB

    • MD5

      45d76dbc83e4ba7f8e860acbb81a5099

    • SHA1

      d33ac9b486fb0f80c27670f6c05c4e00785d5eae

    • SHA256

      851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19

    • SHA512

      497277580506aabc7b34f1024aa376a2c68d02b1fc8a1c7404562802d1ae41d6aa4eedd8ef1194457eb44cfb3869ff37eaaf2bc9ed1efa07212315bf91b2eae6

    • SSDEEP

      192:QL29RBzDzeobchBj8JONqONkEruorEPEjr7Ahh:+29jnbcvYJOHXuovr7Ch

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks