General

  • Target

    8f11b912d699cda82e12ca5820c83d10bf8ae6a36ff66b655e69904a4e1340de

  • Size

    12KB

  • Sample

    240522-xhwvkscf6s

  • MD5

    49b910e7e7dd43416bbd14fa753dc2fc

  • SHA1

    3ebb75efd0a40c8400ef75408be2f1316c8eee37

  • SHA256

    8f11b912d699cda82e12ca5820c83d10bf8ae6a36ff66b655e69904a4e1340de

  • SHA512

    a445c3ae5c1827d858f6328d11c8ea8b2b34a7580c2dce383aff4addd0405e9b9a691bf2f0336cb982f895cf2d7d74b0562ab6411f9d30f91472ee3126d8e4e6

  • SSDEEP

    192:qL29RBzDzeobchBj8JON+ON/rucrEPEjr7Ahd:U29jnbcvYJOTxucvr7Cd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      8f11b912d699cda82e12ca5820c83d10bf8ae6a36ff66b655e69904a4e1340de

    • Size

      12KB

    • MD5

      49b910e7e7dd43416bbd14fa753dc2fc

    • SHA1

      3ebb75efd0a40c8400ef75408be2f1316c8eee37

    • SHA256

      8f11b912d699cda82e12ca5820c83d10bf8ae6a36ff66b655e69904a4e1340de

    • SHA512

      a445c3ae5c1827d858f6328d11c8ea8b2b34a7580c2dce383aff4addd0405e9b9a691bf2f0336cb982f895cf2d7d74b0562ab6411f9d30f91472ee3126d8e4e6

    • SSDEEP

      192:qL29RBzDzeobchBj8JON+ON/rucrEPEjr7Ahd:U29jnbcvYJOTxucvr7Cd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks