General

  • Target

    a119e549fa3a1b4aa04c30e6f8eb52d2212cb4640fcff059c1e5b28d59731219

  • Size

    12KB

  • Sample

    240522-wtymwabf37

  • MD5

    a3c93d730f69e010971752e8a92e8f6d

  • SHA1

    0803fed0b9ef059ba19e5ea489542c88eed1112f

  • SHA256

    a119e549fa3a1b4aa04c30e6f8eb52d2212cb4640fcff059c1e5b28d59731219

  • SHA512

    eae2f27d9446451b17f7f89312ff2aa958a11298273437cee2f3cbb1d4db182743e7d8151097b0f7a73fd2aedd936e47df41372d731733ee7207a6587eac16c5

  • SSDEEP

    192:QL29RBzDzeobchBj8JON4ON8UrumrEPEjr7Ahz:+29jnbcvYJO5fumvr7Cz

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a119e549fa3a1b4aa04c30e6f8eb52d2212cb4640fcff059c1e5b28d59731219

    • Size

      12KB

    • MD5

      a3c93d730f69e010971752e8a92e8f6d

    • SHA1

      0803fed0b9ef059ba19e5ea489542c88eed1112f

    • SHA256

      a119e549fa3a1b4aa04c30e6f8eb52d2212cb4640fcff059c1e5b28d59731219

    • SHA512

      eae2f27d9446451b17f7f89312ff2aa958a11298273437cee2f3cbb1d4db182743e7d8151097b0f7a73fd2aedd936e47df41372d731733ee7207a6587eac16c5

    • SSDEEP

      192:QL29RBzDzeobchBj8JON4ON8UrumrEPEjr7Ahz:+29jnbcvYJO5fumvr7Cz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks