General

  • Target

    4c98da14310b5156e4384dd4fd77939d5a781eb0301c602c97a4bd6f22504837

  • Size

    12KB

  • Sample

    240522-vj8jnahh7t

  • MD5

    ccfa2f28e7298b5fc5d9c21072f71ad9

  • SHA1

    253064febc68885baec7844dd4e24397846e7a4a

  • SHA256

    4c98da14310b5156e4384dd4fd77939d5a781eb0301c602c97a4bd6f22504837

  • SHA512

    b3b4e53f75341a0fb10445d8ee7d43c236b661853a60ce1d79b4e96e2bd348302fbafa7d972bec90a86cc7e07d9e81f85f5d7d65dee4eb44af0ceb191515f58d

  • SSDEEP

    192:jL29RBzDzeobchBj8JONCONVSruUKrEPEjr7Ahp:f29jnbcvYJOvHGu1vr7Cp

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      4c98da14310b5156e4384dd4fd77939d5a781eb0301c602c97a4bd6f22504837

    • Size

      12KB

    • MD5

      ccfa2f28e7298b5fc5d9c21072f71ad9

    • SHA1

      253064febc68885baec7844dd4e24397846e7a4a

    • SHA256

      4c98da14310b5156e4384dd4fd77939d5a781eb0301c602c97a4bd6f22504837

    • SHA512

      b3b4e53f75341a0fb10445d8ee7d43c236b661853a60ce1d79b4e96e2bd348302fbafa7d972bec90a86cc7e07d9e81f85f5d7d65dee4eb44af0ceb191515f58d

    • SSDEEP

      192:jL29RBzDzeobchBj8JONCONVSruUKrEPEjr7Ahp:f29jnbcvYJOvHGu1vr7Cp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks