General

  • Target

    0c2cc61e4e82d791a3616cf664de1d1e03a937a2473079dd49ae146959b715ea

  • Size

    12KB

  • Sample

    240522-wqhggsbc71

  • MD5

    18e176921ed58908b20b7b23037ecd03

  • SHA1

    24e785ac4c6e96954e70451c02aa35d2b474c648

  • SHA256

    0c2cc61e4e82d791a3616cf664de1d1e03a937a2473079dd49ae146959b715ea

  • SHA512

    d02312253453fba1139f669fc8d8a059a43177ff609d19b34882dbdc656966c40caa1f1fda829525f21153e39ab2cd280114321bd1efe3b30d867da996e72ef5

  • SSDEEP

    192:fL29RBzDzeobchBj8JONUONhru8rEPEjr7Ahv:z29jnbcvYJOBju8vr7Cv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      0c2cc61e4e82d791a3616cf664de1d1e03a937a2473079dd49ae146959b715ea

    • Size

      12KB

    • MD5

      18e176921ed58908b20b7b23037ecd03

    • SHA1

      24e785ac4c6e96954e70451c02aa35d2b474c648

    • SHA256

      0c2cc61e4e82d791a3616cf664de1d1e03a937a2473079dd49ae146959b715ea

    • SHA512

      d02312253453fba1139f669fc8d8a059a43177ff609d19b34882dbdc656966c40caa1f1fda829525f21153e39ab2cd280114321bd1efe3b30d867da996e72ef5

    • SSDEEP

      192:fL29RBzDzeobchBj8JONUONhru8rEPEjr7Ahv:z29jnbcvYJOBju8vr7Cv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks