General

  • Target

    6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00

  • Size

    12KB

  • Sample

    240522-xgwhesce9z

  • MD5

    846a3497d741e581c9bf93a6e1e357d7

  • SHA1

    e8a9fa0f9948ebbee820e0def6e2e7aa1a77a772

  • SHA256

    6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00

  • SHA512

    9e265061775e24646d42509f6a400807b98673f504e6c8b27c97e23131bed06211a250dad15d1b0a03cc8eb59e921605c165d1b7b07041c7a0e98691d31ad979

  • SSDEEP

    192:zL29RBzDzeobchBj8JONeONhruCrEPEjr7AhF:v29jnbcvYJO33uCvr7CF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00

    • Size

      12KB

    • MD5

      846a3497d741e581c9bf93a6e1e357d7

    • SHA1

      e8a9fa0f9948ebbee820e0def6e2e7aa1a77a772

    • SHA256

      6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00

    • SHA512

      9e265061775e24646d42509f6a400807b98673f504e6c8b27c97e23131bed06211a250dad15d1b0a03cc8eb59e921605c165d1b7b07041c7a0e98691d31ad979

    • SSDEEP

      192:zL29RBzDzeobchBj8JONeONhruCrEPEjr7AhF:v29jnbcvYJO33uCvr7CF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks