General

  • Target

    4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc

  • Size

    12KB

  • Sample

    240522-xchqrsce35

  • MD5

    89c02f268f448a1031c0df6da7211c3c

  • SHA1

    58fa042a9f53ff7e140d0759965f137d866bfe62

  • SHA256

    4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc

  • SHA512

    34938959bddeac1c12541d34ae610404254e7dfe76acbcece68d9a4f0c247643274755cf59c2211d8aaaf471db168112817c37c3015c93641288f7bd2ab66539

  • SSDEEP

    192:dL29RBzDzeobchBj8JON2ONHruErEPEjr7Ahl:F29jnbcvYJOz5uEvr7Cl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc

    • Size

      12KB

    • MD5

      89c02f268f448a1031c0df6da7211c3c

    • SHA1

      58fa042a9f53ff7e140d0759965f137d866bfe62

    • SHA256

      4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc

    • SHA512

      34938959bddeac1c12541d34ae610404254e7dfe76acbcece68d9a4f0c247643274755cf59c2211d8aaaf471db168112817c37c3015c93641288f7bd2ab66539

    • SSDEEP

      192:dL29RBzDzeobchBj8JON2ONHruErEPEjr7Ahl:F29jnbcvYJOz5uEvr7Cl

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks