General

  • Target

    875541880e720e6e15bc7ad8271fad17b0eec86d5af676a6a527e8323650e4d1

  • Size

    12KB

  • Sample

    240522-xh5gqacg66

  • MD5

    506c1dff02036f1e35c4b15e8b4aafec

  • SHA1

    3fa9b840c7fdc42be60e4bce786cd53aade53d87

  • SHA256

    875541880e720e6e15bc7ad8271fad17b0eec86d5af676a6a527e8323650e4d1

  • SHA512

    2759bfa307f043d5fd581c340e207ed19c57fd18c5ad77d8706d9411059273d1da5e411412529825c006d7f3ac92ae632aacc35c0e282e78061ab557b4ce4d5a

  • SSDEEP

    192:qsL29RBzDzeobchBj8JON6ONeruQrEPEjr7AhJ:qC29jnbcvYJOXMuQvr7CJ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      875541880e720e6e15bc7ad8271fad17b0eec86d5af676a6a527e8323650e4d1

    • Size

      12KB

    • MD5

      506c1dff02036f1e35c4b15e8b4aafec

    • SHA1

      3fa9b840c7fdc42be60e4bce786cd53aade53d87

    • SHA256

      875541880e720e6e15bc7ad8271fad17b0eec86d5af676a6a527e8323650e4d1

    • SHA512

      2759bfa307f043d5fd581c340e207ed19c57fd18c5ad77d8706d9411059273d1da5e411412529825c006d7f3ac92ae632aacc35c0e282e78061ab557b4ce4d5a

    • SSDEEP

      192:qsL29RBzDzeobchBj8JON6ONeruQrEPEjr7AhJ:qC29jnbcvYJOXMuQvr7CJ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks