General

  • Target

    0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37

  • Size

    12KB

  • Sample

    240522-whbzqsba83

  • MD5

    e67ebcd47b3df4e31662a5a5d0d50154

  • SHA1

    f96842bb192c4bbe064c295c81df874b94ca103f

  • SHA256

    0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37

  • SHA512

    c9bf8b504a860ca7a6959b4a8e3328f01dce11231edc9451f8771a8504ddf8db7cf346399ddc11c15ee833d94e2229c2e62e7259f0c0c5e636fce333a04d2f4e

  • SSDEEP

    192:8L29RBzDzeobchBj8JONLONcruBrEPEjr7Ah8:S29jnbcvYJO8OuBvr7C8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37

    • Size

      12KB

    • MD5

      e67ebcd47b3df4e31662a5a5d0d50154

    • SHA1

      f96842bb192c4bbe064c295c81df874b94ca103f

    • SHA256

      0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37

    • SHA512

      c9bf8b504a860ca7a6959b4a8e3328f01dce11231edc9451f8771a8504ddf8db7cf346399ddc11c15ee833d94e2229c2e62e7259f0c0c5e636fce333a04d2f4e

    • SSDEEP

      192:8L29RBzDzeobchBj8JONLONcruBrEPEjr7Ah8:S29jnbcvYJO8OuBvr7C8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks