General

  • Target

    4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38

  • Size

    12KB

  • Sample

    240522-xhbjmscg44

  • MD5

    dc0495b8e4d1f9ed129a61ee34997832

  • SHA1

    ea9aeac5d36f34518e2c7df0c44cb68ea4df802c

  • SHA256

    4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38

  • SHA512

    ed2ad2cf1147c74fe44a4b251759d986935d149a8763564d34f888e7f1364b40f7538fa54d182b4cac074e5c6ba564a758bcb0d52befc4ff26f1cbdc1f209676

  • SSDEEP

    192:dL29RBzDzeobchBj8JONoONMru9rEPEjr7Ahj:F29jnbcvYJOx2u9vr7Cj

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38

    • Size

      12KB

    • MD5

      dc0495b8e4d1f9ed129a61ee34997832

    • SHA1

      ea9aeac5d36f34518e2c7df0c44cb68ea4df802c

    • SHA256

      4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38

    • SHA512

      ed2ad2cf1147c74fe44a4b251759d986935d149a8763564d34f888e7f1364b40f7538fa54d182b4cac074e5c6ba564a758bcb0d52befc4ff26f1cbdc1f209676

    • SSDEEP

      192:dL29RBzDzeobchBj8JONoONMru9rEPEjr7Ahj:F29jnbcvYJOx2u9vr7Cj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks