General

  • Target

    7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa

  • Size

    12KB

  • Sample

    240522-v8qp5saf97

  • MD5

    898d50cf0dc992f62118bd13ba32accb

  • SHA1

    bd49137ef4d8411565e2adc2285a659134ce3425

  • SHA256

    7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa

  • SHA512

    7702e69a9ba2ac0862f9248a1c11189de554b19f7b91491ccf6bca856a209a57fa6ea28cdabe47ef9791280b561e97e764dca35d95269fa00d39c681ab40bb9c

  • SSDEEP

    192:wL29RBzDzeobchBj8JONGON1ruurEPEjr7Ah1:e29jnbcvYJOPfuuvr7C1

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa

    • Size

      12KB

    • MD5

      898d50cf0dc992f62118bd13ba32accb

    • SHA1

      bd49137ef4d8411565e2adc2285a659134ce3425

    • SHA256

      7754e6d6865dc9cc821a77c5e5f3cdda1de94058781f733f5562d08bcd2bd5fa

    • SHA512

      7702e69a9ba2ac0862f9248a1c11189de554b19f7b91491ccf6bca856a209a57fa6ea28cdabe47ef9791280b561e97e764dca35d95269fa00d39c681ab40bb9c

    • SSDEEP

      192:wL29RBzDzeobchBj8JONGON1ruurEPEjr7Ah1:e29jnbcvYJOPfuuvr7C1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks