General

  • Target

    242787f4334a8e8c1db6ec245b961615f4ace5055103334cfd402cd0c0455589

  • Size

    12KB

  • Sample

    240522-x2cwtadd6y

  • MD5

    339fa3cca21f5d08dda6ed6520f0678e

  • SHA1

    32894d0751317434bba514aece616c932f540101

  • SHA256

    242787f4334a8e8c1db6ec245b961615f4ace5055103334cfd402cd0c0455589

  • SHA512

    267a68365a6b1a36f97b378436e25be87d6acd32419f20203b9ade8012b4a63f36ef8ed8ad6b2eb1aa9a0cbbdaa1fe742e1f02e7360de7049a509ff0e35e7783

  • SSDEEP

    192:TL29RBzDzeobchBj8JONoONvruxrEPEjr7AhL:P29jnbcvYJORZuxvr7CL

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      242787f4334a8e8c1db6ec245b961615f4ace5055103334cfd402cd0c0455589

    • Size

      12KB

    • MD5

      339fa3cca21f5d08dda6ed6520f0678e

    • SHA1

      32894d0751317434bba514aece616c932f540101

    • SHA256

      242787f4334a8e8c1db6ec245b961615f4ace5055103334cfd402cd0c0455589

    • SHA512

      267a68365a6b1a36f97b378436e25be87d6acd32419f20203b9ade8012b4a63f36ef8ed8ad6b2eb1aa9a0cbbdaa1fe742e1f02e7360de7049a509ff0e35e7783

    • SSDEEP

      192:TL29RBzDzeobchBj8JONoONvruxrEPEjr7AhL:P29jnbcvYJORZuxvr7CL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks