General

  • Target

    7a25f24bb46d715bc48f8767de65860b36e854fbca7efb94441c0cac0218e16d

  • Size

    12KB

  • Sample

    240522-x1d3gsdd4s

  • MD5

    f66c097a5baefc3c3b17cbb420c2080c

  • SHA1

    d8c87f5cbac9d7d808b131bd9a4b0d2eca5e8e67

  • SHA256

    7a25f24bb46d715bc48f8767de65860b36e854fbca7efb94441c0cac0218e16d

  • SHA512

    95f749c7f2e28ff4c447406bfbfb0a0cf93d9c71c91a238ba98ecfcc3347a75feadf3ab4519f667f4d6e20cb150f460a838e96930c1186fea6b38125951dbe5e

  • SSDEEP

    192:iL29RBzDzeobchBj8JON3ONVEruJrEPEjr7AhLc:829jnbcvYJO8L0uJvr7CA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7a25f24bb46d715bc48f8767de65860b36e854fbca7efb94441c0cac0218e16d

    • Size

      12KB

    • MD5

      f66c097a5baefc3c3b17cbb420c2080c

    • SHA1

      d8c87f5cbac9d7d808b131bd9a4b0d2eca5e8e67

    • SHA256

      7a25f24bb46d715bc48f8767de65860b36e854fbca7efb94441c0cac0218e16d

    • SHA512

      95f749c7f2e28ff4c447406bfbfb0a0cf93d9c71c91a238ba98ecfcc3347a75feadf3ab4519f667f4d6e20cb150f460a838e96930c1186fea6b38125951dbe5e

    • SSDEEP

      192:iL29RBzDzeobchBj8JON3ONVEruJrEPEjr7AhLc:829jnbcvYJO8L0uJvr7CA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks