General

  • Target

    0fd7ef91be84168f2d93deed72d677c39ee7eaf34d90fadd29342eac4474a59b

  • Size

    12KB

  • Sample

    240522-v3clbsae58

  • MD5

    5e828f7a4586c5b9ca4c09c4d46691c0

  • SHA1

    a163573fc9a8a58b8b39647b15639c0356719d69

  • SHA256

    0fd7ef91be84168f2d93deed72d677c39ee7eaf34d90fadd29342eac4474a59b

  • SHA512

    d6e550a2a85e15a23eae7474fd8af8e6e1afaa5fd5d8b115350ba24fee603cf11bbcd2371b0ef503dd65580af5ca61ac7553b1cbf8f4d484c1e434e58563faf8

  • SSDEEP

    192:jL29RBzDzeobchBj8JONEONeru7rEPEjr7AhH:f29jnbcvYJOV0u7vr7CH

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      0fd7ef91be84168f2d93deed72d677c39ee7eaf34d90fadd29342eac4474a59b

    • Size

      12KB

    • MD5

      5e828f7a4586c5b9ca4c09c4d46691c0

    • SHA1

      a163573fc9a8a58b8b39647b15639c0356719d69

    • SHA256

      0fd7ef91be84168f2d93deed72d677c39ee7eaf34d90fadd29342eac4474a59b

    • SHA512

      d6e550a2a85e15a23eae7474fd8af8e6e1afaa5fd5d8b115350ba24fee603cf11bbcd2371b0ef503dd65580af5ca61ac7553b1cbf8f4d484c1e434e58563faf8

    • SSDEEP

      192:jL29RBzDzeobchBj8JONEONeru7rEPEjr7AhH:f29jnbcvYJOV0u7vr7CH

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks