General

  • Target

    880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f

  • Size

    12KB

  • Sample

    240522-vtvqjsac6s

  • MD5

    50d2a1a05d05b15baf3c4864b5dc329b

  • SHA1

    d681d7e84d9777fc66072a641eae4a4cfb53b7c3

  • SHA256

    880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f

  • SHA512

    c0487f6d0754739c07c8fd0c3f137612615a39e131e9eb954e76ae46bf27137f38198585c1ed84d33a16724bd22d05f982e546a47ff727ab4463dcca9f98c706

  • SSDEEP

    192:GL29RBzDzeobchBj8JON2ON1rQrulrEPEjr7AhV:o29jnbcvYJO/HrIulvr7CV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f

    • Size

      12KB

    • MD5

      50d2a1a05d05b15baf3c4864b5dc329b

    • SHA1

      d681d7e84d9777fc66072a641eae4a4cfb53b7c3

    • SHA256

      880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f

    • SHA512

      c0487f6d0754739c07c8fd0c3f137612615a39e131e9eb954e76ae46bf27137f38198585c1ed84d33a16724bd22d05f982e546a47ff727ab4463dcca9f98c706

    • SSDEEP

      192:GL29RBzDzeobchBj8JON2ON1rQrulrEPEjr7AhV:o29jnbcvYJO/HrIulvr7CV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks