General

  • Target

    54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d

  • Size

    12KB

  • Sample

    240522-x4rsrade7x

  • MD5

    97ce812f36967798872b3b04614848e4

  • SHA1

    3a34db882e1c0d4882f3dd927108129cae079b80

  • SHA256

    54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d

  • SHA512

    90c57bf4a5a67f9ec170abd9c793168872c8759ddd1a27ebb291fe856d1015ff4282143e90c39ade01ea63a5a7269c8d26b3472dd2ec9c477aa833cac80577c7

  • SSDEEP

    192:gZL29RBzDzeobchBj8JONmONV+ru7rEPEjr7Ah9:g529jnbcvYJO/mu7vr7C9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d

    • Size

      12KB

    • MD5

      97ce812f36967798872b3b04614848e4

    • SHA1

      3a34db882e1c0d4882f3dd927108129cae079b80

    • SHA256

      54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d

    • SHA512

      90c57bf4a5a67f9ec170abd9c793168872c8759ddd1a27ebb291fe856d1015ff4282143e90c39ade01ea63a5a7269c8d26b3472dd2ec9c477aa833cac80577c7

    • SSDEEP

      192:gZL29RBzDzeobchBj8JONmONV+ru7rEPEjr7Ah9:g529jnbcvYJO/mu7vr7C9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks