General

  • Target

    e63b75b78818d3960063487508c86c0eebf568819abe8cdc5d3b5ab76770ece3

  • Size

    12KB

  • Sample

    240522-tv7wtsha8x

  • MD5

    351b24139176f468b9af0031fab5f5a7

  • SHA1

    29ba3efe50158d61a019fd8643edb7cac31754e6

  • SHA256

    e63b75b78818d3960063487508c86c0eebf568819abe8cdc5d3b5ab76770ece3

  • SHA512

    c6228d4eec30bebe32f4fdc00b42091134e9819a2b09c38de5420e1e8220ada08090fc1cef2f7e610e7cff4f8b8f1e8e1d400933d052bde18bf8c4a3211643aa

  • SSDEEP

    192:bL29RBzDzeobchBj8JONpON9rufrEPEjr7Ahu:H29jnbcvYJOCXufvr7Cu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      e63b75b78818d3960063487508c86c0eebf568819abe8cdc5d3b5ab76770ece3

    • Size

      12KB

    • MD5

      351b24139176f468b9af0031fab5f5a7

    • SHA1

      29ba3efe50158d61a019fd8643edb7cac31754e6

    • SHA256

      e63b75b78818d3960063487508c86c0eebf568819abe8cdc5d3b5ab76770ece3

    • SHA512

      c6228d4eec30bebe32f4fdc00b42091134e9819a2b09c38de5420e1e8220ada08090fc1cef2f7e610e7cff4f8b8f1e8e1d400933d052bde18bf8c4a3211643aa

    • SSDEEP

      192:bL29RBzDzeobchBj8JONpON9rufrEPEjr7Ahu:H29jnbcvYJOCXufvr7Cu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks