General

  • Target

    095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5

  • Size

    12KB

  • Sample

    240522-xjzymacg92

  • MD5

    e0dd8486e53842574ab48c83eff4a54d

  • SHA1

    840932d4ee8d7d3545b777adf5741bed53d19d01

  • SHA256

    095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5

  • SHA512

    e7c4d7b4d7e50ae94a140a7ca8a3b440d59bd7a85784b59304a0b640b40a5c7a2ad0e0cb7167f9dcb9f09683975e6917da63cd7032af6b56b04936d373197704

  • SSDEEP

    192:2L29RBzDzeobchBj8JONauONsgrNzruqrEPEjr7Ah7e:Y29jnbcvYJOExJrNfuqvr7CS

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5

    • Size

      12KB

    • MD5

      e0dd8486e53842574ab48c83eff4a54d

    • SHA1

      840932d4ee8d7d3545b777adf5741bed53d19d01

    • SHA256

      095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5

    • SHA512

      e7c4d7b4d7e50ae94a140a7ca8a3b440d59bd7a85784b59304a0b640b40a5c7a2ad0e0cb7167f9dcb9f09683975e6917da63cd7032af6b56b04936d373197704

    • SSDEEP

      192:2L29RBzDzeobchBj8JONauONsgrNzruqrEPEjr7Ah7e:Y29jnbcvYJOExJrNfuqvr7CS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks