General

  • Target

    4d2875e9b5f697b7fc969ba2a59d95e22f43ed56f924055bc3845db49c533d7c

  • Size

    12KB

  • Sample

    240522-va84tshf3v

  • MD5

    41b1936a67e98e3be217bc406054c6ce

  • SHA1

    4daf58a97f6b303fad2b5dd5d0c3eac60d67e9d9

  • SHA256

    4d2875e9b5f697b7fc969ba2a59d95e22f43ed56f924055bc3845db49c533d7c

  • SHA512

    df340a718ae05746bc2dc9ec1fd3517236ff499362630731bf9ad7112410fffd111979ecdebe98fe961341f91a1699af2b08f12df437fb5fe6f176fa8d744367

  • SSDEEP

    192:pL29RBzDzeobchBj8JONIONhruyrEPEjr7Ahb:J29jnbcvYJOFfuyvr7Cb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      4d2875e9b5f697b7fc969ba2a59d95e22f43ed56f924055bc3845db49c533d7c

    • Size

      12KB

    • MD5

      41b1936a67e98e3be217bc406054c6ce

    • SHA1

      4daf58a97f6b303fad2b5dd5d0c3eac60d67e9d9

    • SHA256

      4d2875e9b5f697b7fc969ba2a59d95e22f43ed56f924055bc3845db49c533d7c

    • SHA512

      df340a718ae05746bc2dc9ec1fd3517236ff499362630731bf9ad7112410fffd111979ecdebe98fe961341f91a1699af2b08f12df437fb5fe6f176fa8d744367

    • SSDEEP

      192:pL29RBzDzeobchBj8JONIONhruyrEPEjr7Ahb:J29jnbcvYJOFfuyvr7Cb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks