General

  • Target

    7cce446dde530d2ca0b513886d8dc598c668f762bac2607fc3f9cbaeb4fbb9f7

  • Size

    12KB

  • Sample

    240522-wz5y5sbg5y

  • MD5

    33db918e6c80cf0a8374b317e669bd0f

  • SHA1

    8fe2c12b5a12587dd01ebd2e29931e52393b8396

  • SHA256

    7cce446dde530d2ca0b513886d8dc598c668f762bac2607fc3f9cbaeb4fbb9f7

  • SHA512

    24c6d5cd5c36b1bb19bfd213a7d6632b301db01c09549372df0e2f88b70e558228924878ced1ab6281b80b3d4ae6be796eef7867f3409dfec8529dcc7d1cec5b

  • SSDEEP

    192:SL29RBzDzeobchBj8JONtONlruarEPEjr7AhK:s29jnbcvYJO6Xuavr7CK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7cce446dde530d2ca0b513886d8dc598c668f762bac2607fc3f9cbaeb4fbb9f7

    • Size

      12KB

    • MD5

      33db918e6c80cf0a8374b317e669bd0f

    • SHA1

      8fe2c12b5a12587dd01ebd2e29931e52393b8396

    • SHA256

      7cce446dde530d2ca0b513886d8dc598c668f762bac2607fc3f9cbaeb4fbb9f7

    • SHA512

      24c6d5cd5c36b1bb19bfd213a7d6632b301db01c09549372df0e2f88b70e558228924878ced1ab6281b80b3d4ae6be796eef7867f3409dfec8529dcc7d1cec5b

    • SSDEEP

      192:SL29RBzDzeobchBj8JONtONlruarEPEjr7AhK:s29jnbcvYJO6Xuavr7CK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks