General

  • Target

    147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a

  • Size

    12KB

  • Sample

    240522-wgpjfaba2v

  • MD5

    0ad007b299dcf86e22965d0f3830d793

  • SHA1

    8ba635452a8ecbfd63a041c9b45dacf4442eaa6d

  • SHA256

    147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a

  • SHA512

    79b89f9f37ab7662bf62441c4d4681623c6c91ea4715742f62e1e42be80e6cc40efd6ac03d6e9052eb5a4dd574f8416c76044da3c7693c3b63000c5f4a1a767e

  • SSDEEP

    192:A4L29RBzDzeobchBj8JONrONCruBrEPEjr7Ahs:l29jnbcvYJOcwuBvr7Cs

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a

    • Size

      12KB

    • MD5

      0ad007b299dcf86e22965d0f3830d793

    • SHA1

      8ba635452a8ecbfd63a041c9b45dacf4442eaa6d

    • SHA256

      147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a

    • SHA512

      79b89f9f37ab7662bf62441c4d4681623c6c91ea4715742f62e1e42be80e6cc40efd6ac03d6e9052eb5a4dd574f8416c76044da3c7693c3b63000c5f4a1a767e

    • SSDEEP

      192:A4L29RBzDzeobchBj8JONrONCruBrEPEjr7Ahs:l29jnbcvYJOcwuBvr7Cs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks