General

  • Target

    0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678

  • Size

    12KB

  • Sample

    240522-x1p5rade29

  • MD5

    009e0d9c56b240aa90bbb605db9b7aba

  • SHA1

    001b10c580b2dd8d6ab6755ee0bc1101e39e427b

  • SHA256

    0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678

  • SHA512

    063f3a8fde1ab9abbf9f963eaf0f56bacc4524fbf344fcc911406cd263e3cb8e8052a0247426f9d8ee224a3c09ba75e59153e931d4f9f07334d5b5d7c88b7282

  • SSDEEP

    192:oL29RBzDzeobchBj8JONfONJOruNrEPEjr7AhQ:m29jnbcvYJOk7KuNvr7CQ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678

    • Size

      12KB

    • MD5

      009e0d9c56b240aa90bbb605db9b7aba

    • SHA1

      001b10c580b2dd8d6ab6755ee0bc1101e39e427b

    • SHA256

      0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678

    • SHA512

      063f3a8fde1ab9abbf9f963eaf0f56bacc4524fbf344fcc911406cd263e3cb8e8052a0247426f9d8ee224a3c09ba75e59153e931d4f9f07334d5b5d7c88b7282

    • SSDEEP

      192:oL29RBzDzeobchBj8JONfONJOruNrEPEjr7AhQ:m29jnbcvYJOk7KuNvr7CQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks