General

  • Target

    509a60ca4450beb971617b9dc830ece52504a4b30102dfd41e431d6c9ccbc072

  • Size

    12KB

  • Sample

    240522-3rw5ladf99

  • MD5

    c35c79b262d9ae387c6b14b2e352bd2b

  • SHA1

    b0a701a318a761bf680f5f8e34349d335db30ab0

  • SHA256

    509a60ca4450beb971617b9dc830ece52504a4b30102dfd41e431d6c9ccbc072

  • SHA512

    2b2ba6d8ba7285baabdbe76b07b457d519fe529a2f25568f3e245a9ed963cc8d0e31c977142c9566696ad4570257adbf384a7a753925da8bb61f8fd6ee02ec6a

  • SSDEEP

    192:tL29RBzDzeobchBj8JONbONZqruzrEPEjr7AhE:V29jnbcvYJOMvuuzvr7CE

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      509a60ca4450beb971617b9dc830ece52504a4b30102dfd41e431d6c9ccbc072

    • Size

      12KB

    • MD5

      c35c79b262d9ae387c6b14b2e352bd2b

    • SHA1

      b0a701a318a761bf680f5f8e34349d335db30ab0

    • SHA256

      509a60ca4450beb971617b9dc830ece52504a4b30102dfd41e431d6c9ccbc072

    • SHA512

      2b2ba6d8ba7285baabdbe76b07b457d519fe529a2f25568f3e245a9ed963cc8d0e31c977142c9566696ad4570257adbf384a7a753925da8bb61f8fd6ee02ec6a

    • SSDEEP

      192:tL29RBzDzeobchBj8JONbONZqruzrEPEjr7AhE:V29jnbcvYJOMvuuzvr7CE

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks