General

  • Target

    e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb

  • Size

    12KB

  • Sample

    240522-vglxwahg7z

  • MD5

    cc273a91c7a37310d8bcf03c5dd26a42

  • SHA1

    e53ca2f70b5fff24afe42c82e84d939627513db8

  • SHA256

    e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb

  • SHA512

    f3d62f54eed1bac2280b2f1c11523c0067efaff5602522b4254fc6c93b3c74dd3fd74c6b8366be279cf47fedb31351708910ccd70ab4a840abfb9740f83800c0

  • SSDEEP

    192:YL29RBzDzeobchBj8JONoONAruYrEPEjr7Ahr:W29jnbcvYJO9KuYvr7Cr

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb

    • Size

      12KB

    • MD5

      cc273a91c7a37310d8bcf03c5dd26a42

    • SHA1

      e53ca2f70b5fff24afe42c82e84d939627513db8

    • SHA256

      e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb

    • SHA512

      f3d62f54eed1bac2280b2f1c11523c0067efaff5602522b4254fc6c93b3c74dd3fd74c6b8366be279cf47fedb31351708910ccd70ab4a840abfb9740f83800c0

    • SSDEEP

      192:YL29RBzDzeobchBj8JONoONAruYrEPEjr7Ahr:W29jnbcvYJO9KuYvr7Cr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks