General

  • Target

    6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da

  • Size

    12KB

  • Sample

    240522-vhx2jahh3w

  • MD5

    1484d55f2792fe5fea92edfcaaee6660

  • SHA1

    5ab74cec30c14d8b7c2a100c380283194ff494f0

  • SHA256

    6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da

  • SHA512

    6b112a15c751d68475c23708f5e92e9926d8e54a4367bc2a7d4abc72cafaa73e356fafb0b9860267389ffb9db44b994b13e8bd79b5faf8f082e0e5be76fb773a

  • SSDEEP

    192:QL29RBzDzeobchBj8JONnON1rusrEPEjr7AhA:+29jnbcvYJO4rusvr7CA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da

    • Size

      12KB

    • MD5

      1484d55f2792fe5fea92edfcaaee6660

    • SHA1

      5ab74cec30c14d8b7c2a100c380283194ff494f0

    • SHA256

      6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da

    • SHA512

      6b112a15c751d68475c23708f5e92e9926d8e54a4367bc2a7d4abc72cafaa73e356fafb0b9860267389ffb9db44b994b13e8bd79b5faf8f082e0e5be76fb773a

    • SSDEEP

      192:QL29RBzDzeobchBj8JONnON1rusrEPEjr7AhA:+29jnbcvYJO4rusvr7CA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks