General

  • Target

    0e31d7f7712204afeeb82340286b5faacd389153054b3b2b78d2230b063f9b9d

  • Size

    12KB

  • Sample

    240522-3xwe9adh98

  • MD5

    4111a7a900c09f62f378b5ac233f9f87

  • SHA1

    4e0b6711bfdf268b44ce3c363bc6f4cf647f8dfd

  • SHA256

    0e31d7f7712204afeeb82340286b5faacd389153054b3b2b78d2230b063f9b9d

  • SHA512

    824e1fba6c9be377ba3bce80c5ea1234f90976debafa9d6840eb00795721fe8ed460b62842e3093b1af0dd53d71515280edfe50f8ba785f20ac9d7582ea68b36

  • SSDEEP

    192:lL29RBzDzeobchBj8JONFONo6ru9rEPEjr7Aha:d29jnbcvYJOKm+u9vr7Ca

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      0e31d7f7712204afeeb82340286b5faacd389153054b3b2b78d2230b063f9b9d

    • Size

      12KB

    • MD5

      4111a7a900c09f62f378b5ac233f9f87

    • SHA1

      4e0b6711bfdf268b44ce3c363bc6f4cf647f8dfd

    • SHA256

      0e31d7f7712204afeeb82340286b5faacd389153054b3b2b78d2230b063f9b9d

    • SHA512

      824e1fba6c9be377ba3bce80c5ea1234f90976debafa9d6840eb00795721fe8ed460b62842e3093b1af0dd53d71515280edfe50f8ba785f20ac9d7582ea68b36

    • SSDEEP

      192:lL29RBzDzeobchBj8JONFONo6ru9rEPEjr7Aha:d29jnbcvYJOKm+u9vr7Ca

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks