General

  • Target

    a7c21bf99b3b3dbbfe973a74e30427892adff537d14bfe5ec726aa3e8e62092d

  • Size

    12KB

  • Sample

    240522-3vae1adg97

  • MD5

    80556a4dacee552a7fd1e09ba60197cc

  • SHA1

    febac442c58243ee9dffed813c6138b0e17bcd76

  • SHA256

    a7c21bf99b3b3dbbfe973a74e30427892adff537d14bfe5ec726aa3e8e62092d

  • SHA512

    5d00965961578744084d61ef0702633b47a387bc6e96c42a7e350e9a52372e74de37513bc101918aa5ac730bba2c58e249b788b1ccd11e197893a772b99dbb97

  • SSDEEP

    192:DL29RBzDzeobchBj8JON4ONGruaUrEPEjr7AhD:/29jnbcvYJO10uaUvr7CD

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a7c21bf99b3b3dbbfe973a74e30427892adff537d14bfe5ec726aa3e8e62092d

    • Size

      12KB

    • MD5

      80556a4dacee552a7fd1e09ba60197cc

    • SHA1

      febac442c58243ee9dffed813c6138b0e17bcd76

    • SHA256

      a7c21bf99b3b3dbbfe973a74e30427892adff537d14bfe5ec726aa3e8e62092d

    • SHA512

      5d00965961578744084d61ef0702633b47a387bc6e96c42a7e350e9a52372e74de37513bc101918aa5ac730bba2c58e249b788b1ccd11e197893a772b99dbb97

    • SSDEEP

      192:DL29RBzDzeobchBj8JON4ONGruaUrEPEjr7AhD:/29jnbcvYJO10uaUvr7CD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks