General

  • Target

    896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e

  • Size

    12KB

  • Sample

    240522-wpvqesbc85

  • MD5

    a671ee2e2da907a68af5266f8b2fab3e

  • SHA1

    3e5e041861266ee539e378baf79aef4f5697e129

  • SHA256

    896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e

  • SHA512

    c02dc05394f8a0119b113dd7688459960d88e1b2408fd2448ad8de6731480aee1c8864ec7fe00279b7207b157be43e58cdd04bb0d2fe53b1d37b812b78050bbf

  • SSDEEP

    192:pL29RBzDzeobchBj8JON/ONhruErEPEjr7Ahw:J29jnbcvYJOAPuEvr7Cw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e

    • Size

      12KB

    • MD5

      a671ee2e2da907a68af5266f8b2fab3e

    • SHA1

      3e5e041861266ee539e378baf79aef4f5697e129

    • SHA256

      896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e

    • SHA512

      c02dc05394f8a0119b113dd7688459960d88e1b2408fd2448ad8de6731480aee1c8864ec7fe00279b7207b157be43e58cdd04bb0d2fe53b1d37b812b78050bbf

    • SSDEEP

      192:pL29RBzDzeobchBj8JON/ONhruErEPEjr7Ahw:J29jnbcvYJOAPuEvr7Cw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks